Nessus security scanner generated the following security report when
scanning the internal address of the linksys befsr11 firmware version
1.43.3, Nov 15 2002.
William Reyor
Topsight.net
NESSUS SECURITY SCAN REPORT
Created 25.11.2002 Sorted by vulnerabilities
Session Name : Session1
Start Time : 25.11.2002 21:48:45
Finish Time : 25.11.2002 22:03:17
Elapsed Time : 0 day(s) 00:14:31
Total security holes found : 4
high severity : 4
low severity : 0
informational : 0
Scanned hosts:
Name High Low Info
------------------------------------------------
192.168.1.1 4 0 0
Service: http (80/tcp)
Severity: High
It was possible to crash the remote modem by
telnetting to it on port 80 and by making
the following request :
GET /login.htm?password=AA[...]AAA
To reactivate your modem, just reset it.
An attacker can use this to prevent your
network from connecting onto the internet.
scanning the internal address of the linksys befsr11 firmware version
1.43.3, Nov 15 2002.
William Reyor
Topsight.net
NESSUS SECURITY SCAN REPORT
Created 25.11.2002 Sorted by vulnerabilities
Session Name : Session1
Start Time : 25.11.2002 21:48:45
Finish Time : 25.11.2002 22:03:17
Elapsed Time : 0 day(s) 00:14:31
Total security holes found : 4
high severity : 4
low severity : 0
informational : 0
Scanned hosts:
Name High Low Info
------------------------------------------------
192.168.1.1 4 0 0
Service: http (80/tcp)
Severity: High
It was possible to crash the remote modem by
telnetting to it on port 80 and by making
the following request :
GET /login.htm?password=AA[...]AAA
To reactivate your modem, just reset it.
An attacker can use this to prevent your
network from connecting onto the internet.
Solution : change your ISDN modem.
Risk factor : High
CVE : CAN-1999-1533
Vulnerable hosts:
192.168.1.1
------------------------------------------------------------------------
--
Service: http (80/tcp)
Severity: High
There's a buffer overflow in the remote web server.
It is possible to overflow the remote web server and execute
commands as user SYSTEM.
See http://www.eeye.com/html/Research/Advisories/AD20010501.html
for more details.
Solution: See
http://www.microsoft.com/technet/security/bulletin/ms01-023.asp
Risk factor : High
CVE : CVE-2001-0241
Vulnerable hosts:
192.168.1.1
------------------------------------------------------------------------
--
Service: http (80/tcp)
Severity: High
It is possible to make the remote web server execute
arbitrary code by sending the following request :
POST AA[...]AA/ HTTP/1.0
This problem may allow an attacker to execute arbitrary code on
the remote system or create a denial of service.
Solution : None at this time. Use another web server
Risk factor : High
CVE : CAN-2000-0626
Vulnerable hosts:
192.168.1.1
------------------------------------------------------------------------
--
Service: http (80/tcp)
Severity: High
It was possible to kill the web server by
sending an invalid request with a too long Cookie name or value
A cracker may exploit this vulnerability to make your web server
crash continually or even execute arbirtray code on your system.
Solution : upgrade your software or protect it with a filtering reverse
proxy
Risk factor : High
Vulnerable hosts:
192.168.1.1
[ reply ]