lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <OF62314E3A.BDCA0470-ONC2256DF3.0050EF61-C2256DF3.0051CFAF@toptronics.fi>
Date: Fri, 5 Dec 2003 16:47:41 +0200
From: Eerik.Kiskonen@...tronics.fi
To: Michael Renzmann <security@...anic.de>
Cc: bugtraq@...urityfocus.com
Subject: Re: Linksys WRT54G Denial of Service Vulnerability


Buffalo WBR-G54 (Firmware 1.30) is not vulnerable. It answers with "bad 
request" and the http server continues working without problems.

---- clip ---
[stnz@...rship stnz]# nc 192.168.11.1 80
GET
HTTP/1.0 400 Bad Request
Server: micro_httpd
Date: Tue, 01 Jan 2002 06:04:15 GMT
Content-Type: text/html
Connection: close

<HTML><HEAD><TITLE></TITLE><meta http-equiv="Pragma" 
content="no-cache"></HEAD>
<BODY BGCOLOR="#FFFFFF">
Can't parse request.
---- clip ---

-
Ystävällisin terveisin/Best Regards
Turun Tietokeskus Oy/Eerik Kiskonen
Tekninen asiantuntija/Technical specialist
Satakunnantie 110, 20320 TURKU, Finland
Direct.    +358-2-273 4244
Fax.        +358-2-273 4220
E-mail:  eerik.kiskonen@...tronics.fi
Web.     http://www.turuntietokeskus.fi






Michael Renzmann <security@...anic.de>
04.12.2003 06:33

 
        To:     test@...hcentric.net
        cc:     bugtraq@...urityfocus.com
        Subject:        Re: Linksys WRT54G Denial of Service Vulnerability


Hi all.

test@...hcentric.net wrote:
 > Linksys WRT54G Denial of Service Vulnerability

There are some devices out there that are technically identical to the 
WRT54G (for example the Buffalo WBR-G54). Can anyone confirm whether 
they share this issue?

Bye, Mike






Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ