Linksys WIP330 Wireless-G IP Phone DoS Attack
A vulnerability has been identified in Linksys WIP330 Wireless-G IP Phone, which could be exploited by attackers to cause a denial of service. This flaw is due to an error when handling a full nmap port-range scan, which could be exploited by attackers to cause the "PhoneCtl.exe" application to crash, creating a denial of service condition.
Affected Products
Linksys WIP330 Wireless-G IP Phone firmware version 1.00.06A and prior
Solution
The FrSIRT is not aware of any official supplied patch for this issue.
Notification
Be alerted when new exploits, vulnerabilities, or patches related to this product are released. Subscribe to FrSIRT VNS.
References
http://www.frsirt.com/english/advisories/2006/4894
Credits
Vulnerability reported by Shawn Merdinger
ChangeLog
2006-12-07 : Initial release
Feedback
If you have additional information or corrections for this security advisory please submit them via our contact form or by email to updates@frsirt.com.
Affected Products
Linksys WIP330 Wireless-G IP Phone firmware version 1.00.06A and prior
Solution
The FrSIRT is not aware of any official supplied patch for this issue.
Notification
Be alerted when new exploits, vulnerabilities, or patches related to this product are released. Subscribe to FrSIRT VNS.
References
http://www.frsirt.com/english/advisories/2006/4894
Credits
Vulnerability reported by Shawn Merdinger
ChangeLog
2006-12-07 : Initial release
Feedback
If you have additional information or corrections for this security advisory please submit them via our contact form or by email to updates@frsirt.com.
0 Comments:
Post a Comment
<< Home