Create an Account
username: password:
 
  MemeStreams Logo

Linksys DOS vulnerability still exists after two years

search

Dagmar
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Dagmar's topics
Arts
  Sci-Fi/Fantasy Literature
Business
Games
  Role Playing Games
  Video Games
   PC Video Games
   Console Video Games
   Multiplayer Online Games
Health and Wellness
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
  Activism
  Futurism
  Politics and Law
   Internet Civil Liberties
   Surveillance
   Intellectual Property
  Media
  Philosophy
  Religion
  Security
Technology
  Computers
   Computer Security
   PC Hardware
   Computer Networking
   Computing Platforms
    Linux
   Software Development
    Open Source Development
    Perl Programming

support us

Get MemeStreams Stuff!


 
Linksys DOS vulnerability still exists after two years
Topic: Computer Networking 6:25 pm EST, Nov  6, 2008

It's amazing how damn lazy vendors can actually be sometimes.

Two years ago in the midst of some other things, it was discovered that quite a few home network routers (Linksys included) would fail when presented with a DCC request involving bogus port numbers, which would result in an immediate disconnection of the session in use by a user's IRC client.

Relatively simple to fix, or so you'd think.

Today I've learned that even the latest firmware for the WRT54G2 is still vulnerable despite it being impossible to miss that this issue has been around for over two years now.

This despite the fact that the firmware is 1.0.01, build three, and was released on Apr 29, 2008.

Linksys DOS vulnerability still exists after two years



 
 
Powered By Industrial Memetics
RSS2.0