Re: FlowPoint DSL router vulnerability

From: Scott Drassinower (scottdat_private)
Date: Tue Aug 10 1999 - 06:29:05 PDT

  • Next message: David LeBlanc: "Re: ISS Security Advisory: Denial of Service Attack Against"

    Brute force, as it is not likely you will know what the number is without
    physical access to the router.
    
    If you were to block telnet and snmp access to the router, then you
    probably would only have to worry about access via the console port.  I
    think that FlowPoint's graphical admin tools use snmp, but if they don't,
    you'll have to figure out how to block those as well.
    
    --
     Scott M. Drassinower					    scottdat_private
     Cloud 9 Consulting, Inc.			       	     White Plains, NY
     +1 914 696-4000					http://www.cloud9.net
    
    On Tue, 10 Aug 1999, Eric Budke wrote:
    
    > At 12:07 PM 8/7/99 -0400, Scott Drassinower wrote:
    > >It involves a bug that allows a password recovery feature to be utilized
    > >from the LAN or WAN instead of just the serial console port.
    > >
    > >Basically, throwing enough 6 digit numbers at a pre-3.0.8 router will
    > >allow you to get access to the box to do whatever you want.  It appears as
    > >if the problem started in 3.0.4, but I am not totally certain about that.
    >
    > So the vulnerability is essentially a brute force against telnet/snmp?
    > Assuming you filter those out, is there another way of accessing?
    >
    > >--
    > >  Scott M. Drassinower                                       scottdat_private
    > >  Cloud 9 Consulting, Inc.                                    White Plains, NY
    > >  +1 914 696-4000                                        http://www.cloud9.net
    > >
    > >On Thu, 5 Aug 1999, Matt wrote:
    > >
    > > > The following URL contains information about a firmware upgrade for
    > > > FlowPoint DSL routers that fixes a possible "security compromise".
    > > > FlowPoint has chosen not to release ANY information whatsoever about the
    > > > vulnerability. I was curious if anyone had any more information
    > > > about this vulnerability than what FlowPoint is divulging.
    > > >
    > > > http://www.flowpoint.com/support/techbulletin/sec308.htm
    > > >
    > > > thnx
    > > >
    > > > --
    > > > I'm not nice, I'm vicious--it's the secret of my charm.
    > > >
    >
    > --
    > PGP Key can be found at http://www.panix.com/~budke/pgp/budke_budke_com.txt
    >
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:55:49 PDT