ID

VAR-200112-0017


CVE

CVE-2001-0888


TITLE

Atmel SNMP Non-'public 'Password or Unknown OID Denial of Service Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2001-3261

DESCRIPTION

Atmel Firmware 1.3 Wireless Access Point (WAP) allows remote attackers to cause a denial of service via a SNMP request with (1) a community string other than "public" or (2) an unknown OID, which causes the WAP to deny subsequent SNMP requests. Atmel is a chip designer and manufacturer that offers a variety of RF-based products. Atmel manufactures firmware for various wireless access systems. These firmware support SNMP for network management.  Some of these versions of the firmware have security issues that can cause a denial of service attack.  If an SNMP read request is sent using a non-public password or an unknown OID, the device will stop responding and only restart will resume normal operation. The device will not respond to further communication, and a restart is required to regain normal functionality

Trust: 1.8

sources: NVD: CVE-2001-0888 // CNVD: CNVD-2001-3261 // BID: 3734 // VULHUB: VHN-3695

AFFECTED PRODUCTS

vendor:netgearmodel:me102scope:eqversion:1.3

Trust: 1.6

vendor:atmelmodel: - scope:eqversion:1.3

Trust: 1.3

vendor:linksysmodel:wap11scope:eqversion:1.3

Trust: 1.0

vendor:nonemodel: - scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2001-3261 // BID: 3734 // CNNVD: CNNVD-200112-127 // NVD: CVE-2001-0888

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-0888
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200112-127
value: MEDIUM

Trust: 0.6

VULHUB: VHN-3695
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2001-0888
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-3695
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-3695 // CNNVD: CNNVD-200112-127 // NVD: CVE-2001-0888

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-0888

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200112-127

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200112-127

EXTERNAL IDS

db:NVDid:CVE-2001-0888

Trust: 2.3

db:BIDid:3734

Trust: 2.0

db:CNNVDid:CNNVD-200112-127

Trust: 0.7

db:CNVDid:CNVD-2001-3261

Trust: 0.6

db:BUGTRAQid:20011221 VIGILANTE ADVISORY 2001003 : ATMEL SNMP NON PUBLIC COMMUNITY STRING DOS VULNERABILITY

Trust: 0.6

db:XFid:7734

Trust: 0.6

db:VULHUBid:VHN-3695

Trust: 0.1

sources: CNVD: CNVD-2001-3261 // VULHUB: VHN-3695 // BID: 3734 // CNNVD: CNNVD-200112-127 // NVD: CVE-2001-0888

REFERENCES

url:http://www.securityfocus.com/bid/3734

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=100895903202798&w=2

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/7734

Trust: 1.1

url:http://marc.theaimsgroup.com/?l=bugtraq&m=100895903202798&w=2

Trust: 0.6

url:http://xforce.iss.net/static/7734.php

Trust: 0.6

url:http://www.atmel-wm.com/

Trust: 0.3

url:http://www.linksys.com/download/

Trust: 0.3

url:http://www.netgear.com/support_main.asp

Trust: 0.3

sources: VULHUB: VHN-3695 // BID: 3734 // CNNVD: CNNVD-200112-127 // NVD: CVE-2001-0888

CREDITS

Frederic Brouille

Trust: 0.6

sources: CNNVD: CNNVD-200112-127

SOURCES

db:CNVDid:CNVD-2001-3261
db:VULHUBid:VHN-3695
db:BIDid:3734
db:CNNVDid:CNNVD-200112-127
db:NVDid:CVE-2001-0888

LAST UPDATE DATE

2025-04-03T22:40:00.514000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2001-3261date:2001-12-24T00:00:00
db:VULHUBid:VHN-3695date:2017-10-10T00:00:00
db:BIDid:3734date:2001-12-21T00:00:00
db:CNNVDid:CNNVD-200112-127date:2005-10-12T00:00:00
db:NVDid:CVE-2001-0888date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:CNVDid:CNVD-2001-3261date:2001-12-21T00:00:00
db:VULHUBid:VHN-3695date:2001-12-21T00:00:00
db:BIDid:3734date:2001-12-21T00:00:00
db:CNNVDid:CNNVD-200112-127date:2001-12-21T00:00:00
db:NVDid:CVE-2001-0888date:2001-12-21T05:00:00