CVE-2001-1194
CVSS5.0
发布时间 :2001-12-14 00:00:00
修订时间 :2008-09-10 15:09:53
NMCOES    

[原文]Zyxel Prestige 681 and 1600 SDSL Routers allow remote attackers to cause a denial of service via malformed packets with (1) an IP length less than actual packet size, or (2) fragmented packets whose size exceeds 64 kilobytes after reassembly.


[CNNVD]Zyxel Prestige SDSL路由器IP数据包长度远程拒绝服务漏洞(CNNVD-200112-101)

        Zyxel Prestige 681和1600 SDSL Routers存在漏洞。远程攻击者借助带有(1)IP长度小于实际数据包的大小,或者(2)重组后其大小超过64千字节的数据包碎片的畸形数据包导致服务拒绝。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/h:zyxel:prestige_1600
cpe:/h:zyxel:prestige_681

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1194
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1194
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200112-101
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/3695
(VENDOR_ADVISORY)  BID  3695
http://xforce.iss.net/xforce/xfdb/7704
(UNKNOWN)  XF  prestige-dsl-packet-length-dos(7704)
http://archives.neohapsis.com/archives/bugtraq/2001-12/0190.html
(UNKNOWN)  BUGTRAQ  20011218 Re: Zyxel Prestige 681 and 1600 (possibly other?) remote DoS
http://archives.neohapsis.com/archives/bugtraq/2001-12/0140.html
(UNKNOWN)  BUGTRAQ  20011214 Zyxel Prestige 681 and 1600 (possibly other?) remote DoS

- 漏洞信息

Zyxel Prestige SDSL路由器IP数据包长度远程拒绝服务漏洞
中危 设计错误
2001-12-14 00:00:00 2005-10-20 00:00:00
远程  
        Zyxel Prestige 681和1600 SDSL Routers存在漏洞。远程攻击者借助带有(1)IP长度小于实际数据包的大小,或者(2)重组后其大小超过64千字节的数据包碎片的畸形数据包导致服务拒绝。

- 公告与补丁

        Vendor fixes available:
        ZyXEL Prestige 681
        

- 漏洞信息 (21186)

ZyXEL Prestige 681 SDSL Router IP Fragment Reassembly Vulnerability (EDBID:21186)
hardware remote
2001-12-18 Verified
0 Przemyslaw Frasunek
N/A [点击下载]
source: http://www.securityfocus.com/bid/3711/info

Prestige is a product line of DSL routers produced and distributed by Zyxel.

When a Zyxel router receives fragmented packets that after reassembly is greater than 64 kilobytes in length, the router crashes. The router must be power cycled to resume normal operation. This could lead to a remote user denying service to a legitimate user of the router. The router is affected only by fragmented packets received through the DSL interface. Fragmented packets sent through the LAN interface have no affect on the system.

ping -t -l 65500 victim.example.com 		

- 漏洞信息

9979
ZyXEL Prestige Router Fragmented Packet Parsing Remote DoS
Remote / Network Access Denial of Service
Loss of Availability Workaround
Exploit Public Third-party Verified

- 漏洞描述

ZyXel Prestige 681 series DSL routers contains a flaw that may allow a remote denial of service. The issue is triggered when an attacker sends a fragmented packet with a length of greater than 64KB after reassembly, and will result in loss of availability for the device.

- 时间线

2001-12-14 Unknow
2001-12-14 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround: Turn off routing and put device in bridging mode

- 相关参考

- 漏洞作者

- 漏洞信息

Zyxel Prestige SDSL Router IP Packet Length Remote Denial Of Service Vulnerability
Design Error 3695
Yes No
2001-12-14 12:00:00 2009-07-11 09:06:00
This vulnerability was discovered by Przemyslaw Frasunek <venglin@freebsd.lublin.pl>, and announced via Bugtraq on December 14, 2001.

- 受影响的程序版本

ZyXEL Prestige 681
ZyXEL Prestige 1600

- 漏洞讨论

A problem with Zyxel routers has been discovered that could lead to a remote denial of service attack. The problem is in the receipt of malformed packets.

When a Zyxel router receives malformed packets crafted with an IP length shorter than the actual size of the packet, the router becomes unstable and drops connectivity. This loss of connectivity can last up to three minutes. This could lead to a remote user denying service to a legitimate user of the router. The router is affected only by malformed packets received through the DSL interface. Malformed packets sent through the LAN interface have no affect on the system.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Vendor fixes available:


ZyXEL Prestige 681

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站