CVE-2004-2606
CVSS7.5
发布时间 :2004-12-31 00:00:00
修订时间 :2008-09-10 15:34:11
NMCO    

[原文]The Web interface in Linksys WRT54G 2.02.7 and BEFSR41 version 3, with the firewall disabled, allows remote attackers to attempt to login to an administration web page, even when the configuration specifies that remote administration is disabled.


[CNNVD]Linksys WRT54G Router全局访问管理服务漏洞(CNNVD-200412-618)

        
        Linksys WRT54G Router是一款路由器设备。
        Linksys WRT54G Router的WEB管理服务访问限制存在问题,导致远程攻击者可以在外网访问管理接口。
        即使在管理功能关闭的情况下,Linksys WRT54G Router照样在WAN接口上提供80口和443口的管理WEB页面,导致攻击者可以访问管理接口,在结合其他漏洞的情况下可能导致路由器被控制。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/h:linksys:wrt54g:2.02.7Linksys WRT54G 2.02.7
cpe:/h:linksys:befsr41_v3Linksys BEFSR41 3

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2606
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2606
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-618
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/16274
(PATCH)  XF  linksys-remote-bypass-security(16274)
http://www.securityfocus.com/bid/10441
(PATCH)  BID  10441
http://web.archive.org/web/20040823075750/http://www.linksys.com/download/firmware.asp?fwid=201
(PATCH)  MISC  http://web.archive.org/web/20040823075750/http://www.linksys.com/download/firmware.asp?fwid=201
http://secunia.com/advisories/11754
(VENDOR_ADVISORY)  SECUNIA  11754
ftp://ftp.linksys.com/pub/network/wrt54g_2.02.8_US_code_beta.zip
(PATCH)  CONFIRM  ftp://ftp.linksys.com/pub/network/wrt54g_2.02.8_US_code_beta.zip
http://www.securityfocus.com/archive/1/365227/30/0/threaded
(UNKNOWN)  BUGTRAQ  20040604 RE: The Linksys WRT54G "security problem" doesn't exist
http://www.securityfocus.com/archive/1/365175
(UNKNOWN)  BUGTRAQ  20040604 The Linksys WRT54G "security problem" doesn't exist
http://www.osvdb.org/6577
(UNKNOWN)  OSVDB  6577
http://www.nwfusion.com/news/2004/0607confuse.html
(UNKNOWN)  MISC  http://www.nwfusion.com/news/2004/0607confuse.html
http://archives.neohapsis.com/archives/bugtraq/2004-06/0190.html
(UNKNOWN)  BUGTRAQ  20040602 Re: The Linksys WRT54G "security problem" doesn't exist
http://archives.neohapsis.com/archives/bugtraq/2004-06/0020.html
(UNKNOWN)  BUGTRAQ  20040602 Additional information on WRT54G administration page
http://archives.neohapsis.com/archives/bugtraq/2004-06/0002.html
(UNKNOWN)  BUGTRAQ  20040601 Re: LinkSys WRT54G administration page availble to WAN
http://archives.neohapsis.com/archives/bugtraq/2004-05/0316.html
(UNKNOWN)  BUGTRAQ  20040531 LinkSys WRT54G administration page availble to WAN

- 漏洞信息

Linksys WRT54G Router全局访问管理服务漏洞
高危 设计错误
2004-12-31 00:00:00 2006-01-23 00:00:00
远程  
        
        Linksys WRT54G Router是一款路由器设备。
        Linksys WRT54G Router的WEB管理服务访问限制存在问题,导致远程攻击者可以在外网访问管理接口。
        即使在管理功能关闭的情况下,Linksys WRT54G Router照样在WAN接口上提供80口和443口的管理WEB页面,导致攻击者可以访问管理接口,在结合其他漏洞的情况下可能导致路由器被控制。
        

- 公告与补丁

        厂商补丁:
        Linksys
        -------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.linksys.com

- 漏洞信息

6577
Cisco Linksys Routers Administrative Web Interface Access
Remote / Network Access Authentication Management, Misconfiguration
Loss of Integrity
Exploit Public

- 漏洞描述

Linksys routers contain a flaw that may allow a malicious user to access the Remote Administration interface. The issue is triggered by the interface being available on port 443, even when Remote Administration is disabled. It is possible that the flaw may allow unauthorized administrative access resulting in a loss of integrity.

- 时间线

2004-05-31 Unknow
2004-05-31 Unknow

- 解决方案

Upgrade to version 2.02.8 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround: Enable the integrated firewall.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站