ID

VAR-201101-0214


CVE

CVE-2011-0352


TITLE

Cisco Linksys WRT54GC vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2011-000007

DESCRIPTION

Buffer overflow in the web-based management interface on the Cisco Linksys WRT54GC router with firmware before 1.06.1 allows remote attackers to cause a denial of service (device crash) via a long string in a POST request. Cisco Linksys WRT54GC provided by Cisco Systems contains a buffer overflow vulnerability. Cisco Linksys WRT54GC provided by Cisco Systems is a network router. Cisco Linksys WRT54GC contains a buffer overflow vulnerability. Yuji Ukai of Fourteenforty Research Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.When processing a specially crafted HTTP request, the router may crash resulting in a denial-of-service (DoS). The Linksys WRT54GC is prone to a remote buffer-overflow vulnerability because it fails to bounds-check user-supplied input before copying it into an insufficiently sized memory buffer. Failed exploit attempts will result in a denial-of-service condition. Linksys WRT54GC firmware versions prior to 1.06.1 are vulnerable. ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). Request a free trial: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: Linksys WRT54GC Web Management Interface Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA43017 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43017/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43017 RELEASE DATE: 2011-01-21 DISCUSS ADVISORY: http://secunia.com/advisories/43017/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/43017/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=43017 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Linksys WRT54GC, which can be exploited by malicious people to compromise a vulnerable system. SOLUTION: Update to firmware version 1.06.1. Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ PROVIDED AND/OR DISCOVERED BY: The vendor credits Yuji Ukai, Fourteenforty Research Institute. ORIGINAL ADVISORY: http://tools.cisco.com/security/center/viewAlert.x?alertId=22228 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2011-0352 // JVNDB: JVNDB-2011-000007 // CNVD: CNVD-2011-0315 // BID: 45943 // VULHUB: VHN-48297 // PACKETSTORM: 97749

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2011-0315

AFFECTED PRODUCTS

vendor:ciscomodel:linksys wrt54gc routerscope:eqversion:1.02.5

Trust: 1.0

vendor:ciscomodel:linksys wrt54gc routerscope:eqversion:1.02.8

Trust: 1.0

vendor:ciscomodel:linksys wrt54gc routerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:linksys wrt54gc routerscope:lteversion:1.05.7

Trust: 1.0

vendor:ciscomodel:linksys wrt54gcscope:eqversion:firmware prior to 1.6.01

Trust: 0.8

vendor:linksysmodel:wrt54gcscope: - version: -

Trust: 0.6

vendor:ciscomodel:linksys wrt54gc routerscope: - version: -

Trust: 0.6

vendor:ciscomodel:linksys wrt54gcscope:eqversion:1.6

Trust: 0.3

vendor:ciscomodel:linksys wrt54gcscope:neversion:1.6.1

Trust: 0.3

sources: CNVD: CNVD-2011-0315 // BID: 45943 // JVNDB: JVNDB-2011-000007 // CNNVD: CNNVD-201101-340 // NVD: CVE-2011-0352

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-0352
value: HIGH

Trust: 1.0

IPA: JVNDB-2011-000007
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201101-340
value: HIGH

Trust: 0.6

VULHUB: VHN-48297
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-0352
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2011-000007
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-48297
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-48297 // JVNDB: JVNDB-2011-000007 // CNNVD: CNNVD-201101-340 // NVD: CVE-2011-0352

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-48297 // JVNDB: JVNDB-2011-000007 // NVD: CVE-2011-0352

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201101-340

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201101-340

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-000007

PATCH

title:22228url:http://tools.cisco.com/security/center/viewAlert.x?alertId=22228

Trust: 0.8

title:Linksys WRT54GC Web Management Interface Buffer Overflow Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/2717

Trust: 0.6

sources: CNVD: CNVD-2011-0315 // JVNDB: JVNDB-2011-000007

EXTERNAL IDS

db:NVDid:CVE-2011-0352

Trust: 3.4

db:SECUNIAid:43017

Trust: 2.6

db:JVNDBid:JVNDB-2011-000007

Trust: 1.9

db:JVNid:JVN26605630

Trust: 1.9

db:VUPENid:ADV-2011-0205

Trust: 1.1

db:CNNVDid:CNNVD-201101-340

Trust: 0.7

db:CNVDid:CNVD-2011-0315

Trust: 0.6

db:BIDid:45943

Trust: 0.4

db:VULHUBid:VHN-48297

Trust: 0.1

db:PACKETSTORMid:97749

Trust: 0.1

sources: CNVD: CNVD-2011-0315 // VULHUB: VHN-48297 // BID: 45943 // JVNDB: JVNDB-2011-000007 // PACKETSTORM: 97749 // CNNVD: CNNVD-201101-340 // NVD: CVE-2011-0352

REFERENCES

url:http://jvn.jp/en/jp/jvn26605630/index.html

Trust: 1.9

url:http://secunia.com/advisories/43017

Trust: 1.9

url:http://tools.cisco.com/security/center/viewalert.x?alertid=22228

Trust: 1.5

url:http://jvndb.jvn.jp/en/contents/2011/jvndb-2011-000007.html

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0205

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/64850

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0352

Trust: 0.8

url:http://www.ipa.go.jp/security/english/vuln/201101_cisco_en.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0352

Trust: 0.8

url:http://secunia.com/advisories/43017/http

Trust: 0.6

url:http://www.linksys.com/

Trust: 0.3

url:http://secunia.com/advisories/43017/#comments

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/43017/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43017

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2011-0315 // VULHUB: VHN-48297 // BID: 45943 // JVNDB: JVNDB-2011-000007 // PACKETSTORM: 97749 // NVD: CVE-2011-0352

CREDITS

Yuji Ukai

Trust: 0.3

sources: BID: 45943

SOURCES

db:CNVDid:CNVD-2011-0315
db:VULHUBid:VHN-48297
db:BIDid:45943
db:JVNDBid:JVNDB-2011-000007
db:PACKETSTORMid:97749
db:CNNVDid:CNNVD-201101-340
db:NVDid:CVE-2011-0352

LAST UPDATE DATE

2025-04-11T23:03:16.972000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-0315date:2011-01-25T00:00:00
db:VULHUBid:VHN-48297date:2017-08-17T00:00:00
db:BIDid:45943date:2011-01-13T00:00:00
db:JVNDBid:JVNDB-2011-000007date:2011-01-21T00:00:00
db:CNNVDid:CNNVD-201101-340date:2011-01-25T00:00:00
db:NVDid:CVE-2011-0352date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2011-0315date:2011-01-25T00:00:00
db:VULHUBid:VHN-48297date:2011-01-24T00:00:00
db:BIDid:45943date:2011-01-13T00:00:00
db:JVNDBid:JVNDB-2011-000007date:2011-01-21T00:00:00
db:PACKETSTORMid:97749date:2011-01-21T07:26:00
db:CNNVDid:CNNVD-201101-340date:2011-01-25T00:00:00
db:NVDid:CVE-2011-0352date:2011-01-24T18:00:04.190