[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3FCED9C9.1070906@dylanic.de>
From: security at dylanic.de (Michael Renzmann)
Subject: [Fwd: Bugtraq: Linksys WRT54G Denial of Service
Vulnerability]
Hi.
Jonathan A. Zdziarski wrote:
> In a lot of cases, this would only be exploitable internally, since many
> configurations are set up not to allow access to the unit externally.
What do you mean with "externally"? WLAN? Internet?
I don't know this particular device, but I know that lots of other
Access Points that have a web interface regard any request from WLAN as
being internal. If this is also the case for the WRT54G, the attack can
be made from anyone who is in reach of the Access Point as described in
the vulnerability report.
> But in any case, there are a lot of other ways to DoS these little
> residential boxes. Running macof (part of the dsniff package) will
> effectively shut down all traffic on the network. I'm sure arpspoof
> without forwarding would do the same thing. I'm surprised these things
> don't support something as basic as SSL for authentication (at least the
> model I've got doesn't)
WRT54G is said to have an https? Or do you mean SSL for authentication
of users before they can access anything on (or behind) the network the
Access Point is attached to?
Bye, Mike
Powered by blists - more mailing lists