Linksys EtherFast routers default SNMP community string information leak

linksys-etherfast-default-snmp (7827) The risk level is classified as MediumMedium Risk

Description:

Linksys EtherFast could allow a remote attacker to gain sensitive information about network traffic that is being handled by the router. A remote attacker can query an affected router with the default community of (public) to cause the router to make the querying system the SNMP trap host, which would cause certain information about network traffic to be dumped to the host. An attacker could use this to launch a distributed denial of service attack (DDoS) against a targeted host by exploiting this vulnerability on a number of affected routers.


Consequences:

Obtain Information

Remedy:

No remedy available as of August 1, 2014.

References:

  • BugTraq Mailing List, Sun Jan 06 2002 - 06:55:17 CST: Linksys 'routers', SNMP issues.
  • BID-3795: Linksys DSL Router SNMP Trap System Arbitrary Sending Vulnerability
  • BID-3797: Linksys DSL Router Default SNMP Community String Vulnerability
  • CVE-2002-0109: Linksys EtherFast BEFN2PS4, BEFSR41, and BEFSR81 Routers, and possibly other products, allow remote attackers to gain sensitive information and cause a denial of service via an SNMP query for the default community string public

Platforms Affected:

  • Linksys BEFN2PS4
  • Linksys BEFSR81

Reported:

Jan 06, 2002

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page