Linksys WAP4400N request denial of service
|linksys-wap4400n-request-dos (45841)||Medium Risk|
Linksys WAP4400N is vulnerable to a denial of service, caused by an error when processing association requests while the access point runs in WEP mode. By sending a specially-crafted association request, a remote attacker could exploit this vulnerability to cause the device to reboot.
Denial of Service
Upgrade to the latest version of WAP4400N (1.2.17 or later), available from the Linksys Web site. See References.
- BugTraq Mailing List, Mon Oct 13 2008 - 06:29:40 CDT: Marvell Driver Malformed Association Request Vulnerability.
- Linksys Web site: WAP4400N - Wireless-N Access Point with Power Over Ethernet.
- BID-31742: Linksys WAP4400N Marvell Wireless Chipset Driver Remote Denial of Service Vulnerability
- CVE-2008-4441: The Marvell driver for the Linksys WAP4400N Wi-Fi access point with firmware 1.2.14 on the Marvell 88W8361P-BEM1 chipset, when WEP mode is enabled, does not properly parse malformed 802.11 frames, which allows remote attackers to cause a denial of service (reboot or hang-up) via a malformed association request containing the WEP flag, as demonstrated by a request that is too short, a different vulnerability than CVE-2008-1144 and CVE-2008-1197.
- SA32259: Linksys WAP4400N Denial of Service and SNMPv3 Vulnerability
- VUPEN/ADV-2008-2805: Linksys WAP4400N Denial of Service and SNMPv3 Issues
- Linksys WAP4400N 1.2.14
- Marvell Semiconductor 88W8361P-BEM1 chipset
Sep 27, 2008
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this
* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.