Friday, December 08, 2006

Linksys WIP330 Wireless-G IP Phone DoS Attack

A vulnerability has been identified in Linksys WIP330 Wireless-G IP Phone, which could be exploited by attackers to cause a denial of service. This flaw is due to an error when handling a full nmap port-range scan, which could be exploited by attackers to cause the "PhoneCtl.exe" application to crash, creating a denial of service condition.

Affected Products

Linksys WIP330 Wireless-G IP Phone firmware version 1.00.06A and prior

Solution

The FrSIRT is not aware of any official supplied patch for this issue.

Notification

Be alerted when new exploits, vulnerabilities, or patches related to this product are released. Subscribe to FrSIRT VNS.

References

http://www.frsirt.com/english/advisories/2006/4894

Credits

Vulnerability reported by Shawn Merdinger

ChangeLog

2006-12-07 : Initial release

Feedback

If you have additional information or corrections for this security advisory please submit them via our contact form or by email to updates@frsirt.com.

0 Comments:

Post a Comment

<< Home