[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-Disclosure] [Fwd: Bugtraq: Linksys WRT54G Denial of Service Vulnerability]



Hi.

Jonathan A. Zdziarski wrote:
In a lot of cases, this would only be exploitable internally, since many
configurations are set up not to allow access to the unit externally.

What do you mean with "externally"? WLAN? Internet?
I don't know this particular device, but I know that lots of other Access Points that have a web interface regard any request from WLAN as being internal. If this is also the case for the WRT54G, the attack can be made from anyone who is in reach of the Access Point as described in the vulnerability report.


But in any case, there are a lot of other ways to DoS these little
residential boxes.  Running macof (part of the dsniff package) will
effectively shut down all traffic on the network.  I'm sure arpspoof
without forwarding would do the same thing.  I'm surprised these things
don't support something as basic as SSL for authentication (at least the
model I've got doesn't)

WRT54G is said to have an https? Or do you mean SSL for authentication of users before they can access anything on (or behind) the network the Access Point is attached to?


Bye, Mike

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html