BugTraq
Various router DoS Mar 04 2006 05:42AM
ryanmeyer14 netscape net (1 replies)
Re: Various router DoS Mar 04 2006 06:23PM
znx (znxster gmail com)
Hey,

Same guy that "released" the norton start/stopkeylogger ..

http://www.hm2k.org/news/1141413208.html the comments provide some more info

On 4 Mar 2006 05:42:11 -0000, ryanmeyer14 (at) netscape (dot) net [email concealed]
<ryanmeyer14 (at) netscape (dot) net [email concealed]> wrote:
> It appears that various routers are prone to an IRC-only DoS attack. Particularly Netgear and Linksys routers have been shown vulnerable.
>
> If a client behind one of the vulnerable routers connects to an IRC server on port 6667 (and only 6667, does not DoS with other ports) and a user posts the following string in either a channel, private message, ctcp, notice, etc.. the router will drop the connection. The string is as follows:
>
> DCC SEND anylongrandomstringhere
>
> It is most commonly being seen as
>
> DCC SEND "string" 0 0 0
>
> but that appears to be unneccessary. The string does need to be 15+ chars in length.
>
> Further, it appears the routers that are vulnerable to this are running vxworks as their embedded OS. Older linux Linksys routers appear to be immune.
>

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus