ID

VAR-200408-0079


CVE

CVE-2004-0580


TITLE

Multiple Linksys Device DHCP Information Leaks and Denial of Service Vulnerabilities

Trust: 0.6

sources: CNVD: CNVD-2004-1417

DESCRIPTION

DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information. Linksys has a variety of network equipment product lines.  Multiple Linksys devices have problems processing DHCP messages. Remote attackers can use this vulnerability to obtain sensitive information or conduct denial of service attacks on the device.  The built-in DHCP server of these devices has a security vulnerability. The DHCP server of these devices incorrectly processes BOOTP packets. When returning a BOOTP response, it fills some of the information in the memory into the BOOTP field, so the attacker can gain sensitivity by sniffing network communications. Information can also lead to a denial of service attack on the device by an attacker. When attempting to exploit this issue, it has been reported that a denial of service condition may occur, stopping legitimate users from using the device

Trust: 1.8

sources: NVD: CVE-2004-0580 // CNVD: CNVD-2004-1417 // BID: 10329 // VULHUB: VHN-9010

AFFECTED PRODUCTS

vendor:linksysmodel:befn2ps4scope:eqversion:1.42.7

Trust: 1.9

vendor:linksysmodel:befsr11scope:eqversion:1.43

Trust: 1.6

vendor:linksysmodel:befsr11scope:eqversion:1.44

Trust: 1.6

vendor:linksysmodel:befsr11scope:eqversion:1.42.7

Trust: 1.6

vendor:linksysmodel:befsr11scope:eqversion:1.41

Trust: 1.6

vendor:linksysmodel:befsr11scope:eqversion:1.43.3

Trust: 1.6

vendor:linksysmodel:befsr11scope:eqversion:1.42.3

Trust: 1.6

vendor:linksysmodel:befsr11scope:eqversion:1.40.2

Trust: 1.6

vendor:linksysmodel:wap55agscope:eqversion:1.0.7

Trust: 1.3

vendor:linksysmodel:befvp41scope:eqversion:1.42.7

Trust: 1.3

vendor:linksysmodel:befvp41scope:eqversion:1.40.4

Trust: 1.3

vendor:linksysmodel:befsx41scope:eqversion:1.45.3

Trust: 1.3

vendor:linksysmodel:befsx41scope:eqversion:1.44.3

Trust: 1.3

vendor:linksysmodel:befsx41scope:eqversion:1.44

Trust: 1.3

vendor:linksysmodel:befsx41scope:eqversion:1.43.4

Trust: 1.3

vendor:linksysmodel:befsx41scope:eqversion:1.43.3

Trust: 1.3

vendor:linksysmodel:befsx41scope:eqversion:1.43

Trust: 1.3

vendor:linksysmodel:befsx41scope:eqversion:1.42.7

Trust: 1.3

vendor:linksysmodel:befsr41scope:eqversion:1.44

Trust: 1.0

vendor:linksysmodel:befsr81scope:eqversion:*

Trust: 1.0

vendor:linksysmodel:befsru31scope:eqversion:1.40.2

Trust: 1.0

vendor:linksysmodel:befsru31scope:eqversion:1.42.3

Trust: 1.0

vendor:linksysmodel:befsr41scope:eqversion:1.42.7

Trust: 1.0

vendor:linksysmodel:befsru31scope:eqversion:1.43

Trust: 1.0

vendor:linksysmodel:befvp41scope:eqversion:*

Trust: 1.0

vendor:linksysmodel:befsr41scope:eqversion:1.41

Trust: 1.0

vendor:linksysmodel:befn2ps4scope:eqversion:*

Trust: 1.0

vendor:linksysmodel:befsr41scope:eqversion:1.38.5

Trust: 1.0

vendor:linksysmodel:befsr41scope:eqversion:1.45.7

Trust: 1.0

vendor:linksysmodel:befsr81scope:eqversion:2.42.7.1

Trust: 1.0

vendor:linksysmodel:befsru31scope:eqversion:1.44

Trust: 1.0

vendor:linksysmodel:befvp41scope:eqversion:1.40.3f

Trust: 1.0

vendor:linksysmodel:befsr41scope:eqversion:1.37

Trust: 1.0

vendor:linksysmodel:rv082scope:eqversion:*

Trust: 1.0

vendor:linksysmodel:befsr41scope:eqversion:1.43.3

Trust: 1.0

vendor:linksysmodel:wrt54gscope:eqversion:2.00.8

Trust: 1.0

vendor:linksysmodel:befsr41scope:eqversion:1.35

Trust: 1.0

vendor:linksysmodel:befsru31scope:eqversion:1.41

Trust: 1.0

vendor:linksysmodel:befsru31scope:eqversion:1.42.7

Trust: 1.0

vendor:linksysmodel:befsr41wscope:eqversion:*

Trust: 1.0

vendor:linksysmodel:befsr81scope:eqversion:2.44

Trust: 1.0

vendor:linksysmodel:wrt54gscope:eqversion:1.42.3

Trust: 1.0

vendor:linksysmodel:befsr41scope:eqversion:1.39

Trust: 1.0

vendor:linksysmodel:befvp41scope:eqversion:1.39.64

Trust: 1.0

vendor:linksysmodel:befsr41scope:eqversion:1.40.2

Trust: 1.0

vendor:linksysmodel:befsr41scope:eqversion:1.42.3

Trust: 1.0

vendor:linksysmodel:befsru31scope:eqversion:1.43.3

Trust: 1.0

vendor:linksysmodel:befcmu10scope:eqversion:*

Trust: 1.0

vendor:linksysmodel:befsr41scope:eqversion:1.43

Trust: 1.0

vendor:linksysmodel:befsr41scope:eqversion:1.36

Trust: 1.0

vendor:linksysmodel:befcmu10scope: - version: -

Trust: 0.9

vendor:nonemodel: - scope: - version: -

Trust: 0.6

vendor:linksysmodel:befn2ps4scope: - version: -

Trust: 0.6

vendor:linksysmodel:wrt54gscope:eqversion:v2.02.00.8

Trust: 0.3

vendor:linksysmodel:wpc300n wireless-n notebook adapterscope:eqversion:-4.100.15.5

Trust: 0.3

vendor:linksysmodel:rv082scope: - version: -

Trust: 0.3

vendor:linksysmodel:etherfast befvp41 routerscope:eqversion:1.39.64

Trust: 0.3

vendor:linksysmodel:etherfast befvp41 routerscope: - version: -

Trust: 0.3

vendor:linksysmodel:etherfast befsru31 routerscope:eqversion:1.44

Trust: 0.3

vendor:linksysmodel:etherfast befsru31 routerscope:eqversion:1.43.3

Trust: 0.3

vendor:linksysmodel:etherfast befsru31 routerscope:eqversion:1.43

Trust: 0.3

vendor:linksysmodel:etherfast befsru31 routerscope:eqversion:1.42.7

Trust: 0.3

vendor:linksysmodel:etherfast befsru31 routerscope:eqversion:1.42.3

Trust: 0.3

vendor:linksysmodel:etherfast befsru31 routerscope:eqversion:1.41

Trust: 0.3

vendor:linksysmodel:etherfast befsru31 routerscope:eqversion:1.40.2

Trust: 0.3

vendor:linksysmodel:etherfast befsr81 routerscope:eqversion:2.44

Trust: 0.3

vendor:linksysmodel:etherfast befsr81 routerscope:eqversion:2.42.7

Trust: 0.3

vendor:linksysmodel:etherfast befsr81 routerscope:eqversion:2.42.7.1

Trust: 0.3

vendor:linksysmodel:etherfast befsr81 routerscope: - version: -

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.45.7

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.44

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.43.3

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.43

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.42.7

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.42.3

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.41

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.40.2

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.39

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.38

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.37

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.36

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.35

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:eqversion:1.38.5

Trust: 0.3

vendor:linksysmodel:etherfast befsr11 routerscope:eqversion:1.44

Trust: 0.3

vendor:linksysmodel:etherfast befsr11 routerscope:eqversion:1.43.3

Trust: 0.3

vendor:linksysmodel:etherfast befsr11 routerscope:eqversion:1.43

Trust: 0.3

vendor:linksysmodel:etherfast befsr11 routerscope:eqversion:1.42.7

Trust: 0.3

vendor:linksysmodel:etherfast befsr11 routerscope:eqversion:1.42.3

Trust: 0.3

vendor:linksysmodel:etherfast befsr11 routerscope:eqversion:1.41

Trust: 0.3

vendor:linksysmodel:etherfast befsr11 routerscope:eqversion:1.40.2

Trust: 0.3

vendor:linksysmodel:etherfast befn2ps4 routerscope: - version: -

Trust: 0.3

vendor:linksysmodel:befvp41 .3fscope:eqversion:1.40

Trust: 0.3

vendor:linksysmodel:befsr81scope: - version: -

Trust: 0.3

vendor:linksysmodel:befsr41wscope: - version: -

Trust: 0.3

vendor:linksysmodel:etherfast befsr41 routerscope:neversion:1.05.00

Trust: 0.3

sources: CNVD: CNVD-2004-1417 // BID: 10329 // NVD: CVE-2004-0580 // CNNVD: CNNVD-200408-030

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2004-0580
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200408-030
value: MEDIUM

Trust: 0.6

VULHUB: VHN-9010
value: MEDIUM

Trust: 0.1

NVD:
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

VULHUB: VHN-9010
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-9010 // NVD: CVE-2004-0580 // CNNVD: CNNVD-200408-030

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-0580

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200408-030

TYPE

Design Error

Trust: 0.9

sources: BID: 10329 // CNNVD: CNNVD-200408-030

CONFIGURATIONS

sources: NVD: CVE-2004-0580

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-9010

EXTERNAL IDS

db:NVDid:CVE-2004-0580

Trust: 2.6

db:BIDid:10329

Trust: 2.0

db:OSVDBid:6325

Trust: 1.7

db:SECTRACKid:1010288

Trust: 1.7

db:SECUNIAid:11606

Trust: 1.7

db:CNNVDid:CNNVD-200408-030

Trust: 0.7

db:CNVDid:CNVD-2004-1417

Trust: 0.6

db:BUGTRAQid:20040607 LINKSYS BEFSR41 DHCP VULNERABILITY SERVER LEAKS NETWORK DATA

Trust: 0.6

db:XFid:16142

Trust: 0.6

db:SEEBUGid:SSVID-77851

Trust: 0.1

db:EXPLOIT-DBid:24115

Trust: 0.1

db:VULHUBid:VHN-9010

Trust: 0.1

sources: CNVD: CNVD-2004-1417 // VULHUB: VHN-9010 // BID: 10329 // NVD: CVE-2004-0580 // CNNVD: CNNVD-200408-030

REFERENCES

url:http://www.securityfocus.com/bid/10329

Trust: 1.7

url:http://www.osvdb.org/6325

Trust: 1.7

url:http://securitytracker.com/alerts/2004/may/1010288.html

Trust: 1.7

url:http://secunia.com/advisories/11606

Trust: 1.7

url:http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832&p_%20%5ccreated=1086294093&p_sid=pu1x1idh&p_lva=&p_sp=cf9zcmnopszwx3nvcnrfynk9jnbfz3jpzhnvcnq9%20%5cjnbfcm93x2nudd02ntqmcf9wywdlpte%2a&p_li=

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/16142

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=108662876129301&w=2

Trust: 1.0

url:http://xforce.iss.net/xforce/xfdb/16142

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=108662876129301&w=2

Trust: 0.6

url:http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832&p_created=1086294093&p_sid=pu1x1idh&p_lva=&p_sp=cf9zcmnopszwx3nvcnrfynk9jnbfz3jpzhnvcnq9jnbfcm93x2nudd02ntqmcf9wywdl

Trust: 0.3

url:http://www.linksys.com/products/group.asp?grid=23

Trust: 0.3

url:http://www.linksys.com/

Trust: 0.3

url:/archive/1/365319

Trust: 0.3

url:http://marc.info/?l=bugtraq&m=108662876129301&w=2

Trust: 0.1

url:http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832&p_%20%5ccreated=1086294093&p_sid=pu1x1idh&p_lva=&p_sp=cf9zcmnopszwx3nvcnrfynk9jnbfz3jpzhnvcnq9%20%5cjnbfcm93x2nudd02ntqmcf9wywdlpte%2a&p_li=

Trust: 0.1

sources: VULHUB: VHN-9010 // BID: 10329 // NVD: CVE-2004-0580 // CNNVD: CNNVD-200408-030

CREDITS

Jon Hart※ warchild@spoofed.org

Trust: 0.6

sources: CNNVD: CNNVD-200408-030

SOURCES

db:CNVDid:CNVD-2004-1417
db:VULHUBid:VHN-9010
db:BIDid:10329
db:NVDid:CVE-2004-0580
db:CNNVDid:CNNVD-200408-030

LAST UPDATE DATE

2023-12-18T13:31:00.424000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2004-1417date:2004-05-13T00:00:00
db:VULHUBid:VHN-9010date:2018-08-13T00:00:00
db:BIDid:10329date:2015-03-19T09:44:00
db:NVDid:CVE-2004-0580date:2023-11-07T01:56:43.640
db:CNNVDid:CNNVD-200408-030date:2005-10-20T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2004-1417date:2004-05-13T00:00:00
db:VULHUBid:VHN-9010date:2004-08-06T00:00:00
db:BIDid:10329date:2004-05-13T00:00:00
db:NVDid:CVE-2004-0580date:2004-08-06T04:00:00
db:CNNVDid:CNNVD-200408-030date:2004-05-13T00:00:00