CVE-2001-1221
CVSS5.0
发布时间 :2001-12-21 00:00:00
修订时间 :2008-09-05 16:25:59
NMCOS    

[原文]D-Link DWL-1000AP Firmware 3.2.28 #483 Wireless LAN Access Point uses a default SNMP community string of 'public' which allows remote attackers to gain sensitive information.


[CNNVD]D-Link DWL-1000AP 无线局域网访问点'public'口令漏洞(CNNVD-200112-131)

        
        DLink DWL-1000AP是一款11Mbps的无线局域网访问点产品,是面向家庭用户的,支持WEP,MAC地址控制和用户认证。
        该产品存在一个安全问题,可能导致远程攻击者获取敏感信息。
        该设备缺省带有一个名为'public'的只读SNMP通信字,该通信字不能通过设置取消,因此恶意攻击者可以利用一个SNMP客户端浏览到'public'管理系统库中的敏感信息。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1221
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1221
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200112-131
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/3736
(VENDOR_ADVISORY)  BID  3736
http://www.securityfocus.com/archive/1/246849
(VENDOR_ADVISORY)  BUGTRAQ  20011221 D-Link DWL-1000AP can be compromised because of SNMP configuration

- 漏洞信息

D-Link DWL-1000AP 无线局域网访问点'public'口令漏洞
中危 设计错误
2001-12-21 00:00:00 2005-10-20 00:00:00
远程  
        
        DLink DWL-1000AP是一款11Mbps的无线局域网访问点产品,是面向家庭用户的,支持WEP,MAC地址控制和用户认证。
        该产品存在一个安全问题,可能导致远程攻击者获取敏感信息。
        该设备缺省带有一个名为'public'的只读SNMP通信字,该通信字不能通过设置取消,因此恶意攻击者可以利用一个SNMP客户端浏览到'public'管理系统库中的敏感信息。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 使用锁定访问点程序限制对MIB的访问
        厂商补丁:
        D-Link
        ------
        目前厂商已经发布了新的固件以修复这个安全问题,请到厂商的主页下载:
        
        http://tsd.dlink.com.tw/info.nsf/2eca71a2a969a08e48256adf002b4b61/2471fa3d2572857048256b50001e0709?OpenDocument

- 漏洞信息

59517
D-Link DWL-1000AP Default SNMP Community String
Remote / Network Access Authentication Management
Loss of Integrity Workaround
Exploit Public

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-12-21 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

D-Link DWL-1000AP Wireless LAN Access Point Public Community String Vulnerability
Design Error 3736
Yes No
2001-12-21 12:00:00 2009-07-11 09:06:00
This vulnerability was submitted to BugTraq on December 21st, 2001 by Jonathan Strine <jstrine@netpanel.com>.

- 受影响的程序版本

D-Link DWL-1000AP Firmware 3.2.28 #483

- 漏洞讨论

D-Link DWL-1000AP is a 11Mbps wireless LAN access point product, which is geared towards home users. It supports WEP, MAC address control and user authentication.

A default read-only SNMP community string entitled "public" exists on the device. This community string is hard-coded into the product and cannot be changed with the configuration interface.

As a result, an attacker may use a SNMP client to browse sensitive information contained in the "public" MIB.

The issue is further complicated by BugTraq ID 3735, "D-Link DWL-1000AP Wireless LAN Access Point Plaintext Password Vulnerability".

This issue has been confirmed with the 3.2.28 #483 (Aug 23
2001) firmware. Other versions of the firmware may also be affected.

- 漏洞利用

This issue can be exploited with a SNMP client.

- 解决方案

The vendor has released a firmware upgrade which addresses SNMP security issues. Symantec has not received confirmation from the vendor that this issue is specifically addressed by the upgrade.

The firmware upgrade is available at the following location:

http://tsd.dlink.com.tw/info.nsf/2eca71a2a969a08e48256adf002b4b61/2471fa3d2572857048256b50001e0709?OpenDocument


D-Link DWL-1000AP Firmware 3.2.28 #483

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站