[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <169ffc030603041023n4cc95fcbx@mail.gmail.com>
Date: Sat, 4 Mar 2006 18:23:19 +0000
From: znx <znxster@...il.com>
To: bugtraq@...urityfocus.com
Subject: Re: Various router DoS
Hey,
Same guy that "released" the norton start/stopkeylogger ..
http://www.hm2k.org/news/1141413208.html the comments provide some more info
On 4 Mar 2006 05:42:11 -0000, ryanmeyer14@...scape.net
<ryanmeyer14@...scape.net> wrote:
> It appears that various routers are prone to an IRC-only DoS attack. Particularly Netgear and Linksys routers have been shown vulnerable.
>
> If a client behind one of the vulnerable routers connects to an IRC server on port 6667 (and only 6667, does not DoS with other ports) and a user posts the following string in either a channel, private message, ctcp, notice, etc.. the router will drop the connection. The string is as follows:
>
> DCC SEND anylongrandomstringhere
>
> It is most commonly being seen as
>
> DCC SEND "string" 0 0 0
>
> but that appears to be unneccessary. The string does need to be 15+ chars in length.
>
> Further, it appears the routers that are vulnerable to this are running vxworks as their embedded OS. Older linux Linksys routers appear to be immune.
>
Powered by blists - more mailing lists