Vulnerability Netgear RP-114 Router - nmap causes DOS

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



BugTraq,

This has been submitted to CERT as well. Here is the form I sent to them:

CONTACT INFORMATION
============================================================================
===
Let us know who you are:

 Name			: Omkhar Arasaratnam
 E-mail			: omkhar@ca.ibm.com
 Phone / fax		: 416.991.1301/416.383.3316
 Affiliation and address: IBM Canada Ltd.


Have you reported this to the vendor?  yes

        If so, please let us know whom you've contacted:

	Date of your report	: 12/26/2001
	Vendor contact name	: Paul Marino
	Vendor contact phone	: 408-907-8085
	Vendor contact e-mail	: paul.marino@netgear.com
	Vendor reference number	: 20485470


        If not, we encourage you to do so--vendors need to hear about
	vulnerabilities from you as a customer.


POLICY INFO
============================================================================
===
We encourage communication between vendors and their customers.  When
we forward a report to the vendor, we include the reporter's name and
contact information unless you let us know otherwise.

If you want this report to remain anonymous, please check here:

	___ Do not release my identity to your vendor contact.


TECHNICAL INFO
============================================================================
===
If there is a CERT Vulnerability tracking number please put it
here (otherwise leave blank): VU#______.


Please describe the vulnerability.
---------------------------------
This vulnerability is in regards to the Netgear RP114 router/NAT. This is a
simple solution that allows home users to share their cable modem / DSL
connection. One of the features of this NAT is port filtering. If the router
is told to drop all packets < 1024, and the WAN port is port scanned, the
router will lock. This has been demonstrated on several occasions to Netgear
engineering using nmap.

What is the impact of this vulnerability?
----------------------------------------
For the duration of the scan, no inbound/outbound traffic through the WAN
port.

To your knowledge is the vulnerability currently being exploited?
----------------------------------------------------------------
	no

If there is an exploitation script available, please include it here.
--------------------------------------------------------------------
n/a

Do you know what systems and/or configurations are vulnerable?
-------------------------------------------------------------
Any customer who has this router attached to a cable modem / DSL modem in a
similar configuration.

	System		: RP-114
	OS version	: 3.26 (firmware)
	Verified/Guessed: Verified, may also happen without port filtering
configured.

Are you aware of any workarounds and/or fixes for this vulnerability?
--------------------------------------------------------------------
no

OTHER INFORMATION
===========================================================================
Is there anything else you would like to tell us?

Netgear support has not been very co-operative thus far.


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux