发布时间 :2004-08-06 00:00:00
修订时间 :2017-07-10 21:30:21

[原文]Integer signedness error in D-Link AirPlus DI-614+ running firmware 2.30 and earlier allows remote attackers to cause a denial of service (IP lease depletion) via a DHCP request with the LEASETIME option set to -1, which makes the DHCP lease valid for thirteen or more years.

[CNNVD]D-Link AirPlus DI-614+和DI-604 DHCP Server淹没攻击拒绝服务漏洞(CNNVD-200408-110)

        D-Link AirPlus DI-614+和DI-604是SOHO性质的宽带路由器。
        D-Link AirPlus DI-614+和DI-604对大量DHCP请求缺少正确处理,远程攻击者可以利用这个漏洞对设备进行拒绝服务攻击。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20040628 DLINK 614+ - SOHO routers, DHCP service DOS
(UNKNOWN)  BUGTRAQ  20040629 Re: DLINK 614+ - SOHO routers, system DOS
(UNKNOWN)  XF  dlink-dhcp-request-dos(16531)

- 漏洞信息

D-Link AirPlus DI-614+和DI-604 DHCP Server淹没攻击拒绝服务漏洞
中危 其他
2004-08-06 00:00:00 2005-10-20 00:00:00
        D-Link AirPlus DI-614+和DI-604是SOHO性质的宽带路由器。
        D-Link AirPlus DI-614+和DI-604对大量DHCP请求缺少正确处理,远程攻击者可以利用这个漏洞对设备进行拒绝服务攻击。

- 公告与补丁

        DI-614+ Revision B的firmware 3.41版本已经修正此问题,而DI-614+ Revision A和DI-604设备还没有新的固件来解决此问题,建议用户联系供应商获得升级程序:

- 漏洞信息

D-Link Router DHCP Request Flood DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

D-Link DI614+ and DI624 Xtreme G routers contains a flaw that may allow a remote denial of service. The issue is triggered when a flood of specially crafted DHCP request packets are sent to the device, and will result in loss of availability for the platform.

- 时间线

2004-06-29 2004-05-24
2004-06-29 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround: disable DHCP service.

- 相关参考

- 漏洞作者

- 漏洞信息

D-Link AirPlus DI-614+, DI-624, and DI-604 DHCP Server Flooding Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 10621
Yes No
2004-06-27 12:00:00 2009-07-12 05:16:00
Gregory Duchemin <> reported this vulnerability.

- 受影响的程序版本

D-Link DI-624 SOHO Router 1.28
D-Link DI-614+ 2.30
D-Link DI-604

- 漏洞讨论

The D-Link DI-614+, DI-624, and DI-604 are reported susceptible to a denial of service vulnerability in their DHCP service.

By flooding the DHCP service with valid DHCP requests, the device will reportedly consume all available memory and eventually reboot.

An attacker may be able to deny service to legitimate users of an affected device by repeatedly causing the device to reboot.

The DI-614+ with firmware revision 2.30, and the DI-604 with unknown firmware were reported vulnerable. The DI-624 Revision B was also confirmed susceptible.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: &lt;;.

- 解决方案

Reportedly, firmware revision 3.41 has been released for the DI-614+ Revision B device. Neither the Revision A device (with two antennas), nor the DI-604 device, have new firmware versions to resolve this issue.

Please contact D-Link for further information.

- 相关参考