[NEWS] Belkin F5D6130 Denial of Service Vulnerability (SNMP Request)From: email@example.com
- Previous message: firstname.lastname@example.org: "[NEWS] SAP R/3 Default Password Vulnerability"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: email@example.com To: firstname.lastname@example.org Date: Mon, 26 Aug 2002 22:28:16 +0200 (CEST)
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -
Belkin F5D6130 Denial of Service Vulnerability (SNMP Request)
It is possible to disable the <http://www.belkin.com/> Belkin F5D6130
802.11b AP by issuing a small number of SNMP GetNextRequest requests to
* Belkin F5D6130 firmware 1.4g.8
The attack results in the AP dropping all wireless connections and ceasing
to accept any new connections, the wireless activity LED will stop
blinking. The AP will also stop responding to all IP traffic on its
Ethernet interface thus rendering the device unmanageable. The device will
require power cycling to resume correct operation.
The SNMP community name used in the requests is irrelevant. The device
will respond to the SNMP requests by broadcasting one or more SNMP traps
and then cease to function. This behavior appears to be consistent. The
attack takes a little longer if performed from a wireless system
associated to the target AP and may result in a loss of wireless
connectivity only, leaving the IP stack of the AP intact.
Snmpwalk may readily be used to test for this vulnerability as follows:
'snmpwalk x.x.x.x goodnight' (where x.x.x.x is the IP address of the
Occasionally must be run a couple of times in which case try specifying a
few different objectIDs.
It is not known if other firmware versions are affected or indeed if
differently branded AP devices using the same hardware are vulnerable.
The information has been provided by <mailto:email@example.com> wlanman.
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: firstname.lastname@example.org
In order to subscribe to the mailing list, simply forward this email to: email@example.com
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.