VAR-200412-0048

Vulnerability from variot - Updated: 2023-12-18 11:13

Web-Based Administration in Netgear FVS318 VPN Router allows remote attackers to cause a denial of service (no new connections) via a large number of open HTTP connections. Multiple broadband routers from several different vendors, used for home and small office Internet sharing and routing are reported affected by a denial of service vulnerability in their web-based administration interfaces. The embedded web server is reportedly unable to maintain more than a small number of simultaneous TCP connections. An attacker who maintains a number of connections to port 80 of an affected device will block access to the web administration application for legitimate users. An attacker could block access to the administration interface as long as they can maintain the TCP connections. Netgear FVS318, Linksys BEFSR41, and Microsoft MN-500 devices are reported to be susceptible. NETGEAR FVS318 is a router with VPN, Microsoft MN-500 is a wireless router. There is a problem with the embedded WEB server included by many manufacturers, and a remote attacker can use this vulnerability to conduct a denial of service attack on the management interface of the device

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200412-0048",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "fvs318",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "netgear",
        "version": "1.3"
      },
      {
        "model": "fvs318",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "netgear",
        "version": "1.2"
      },
      {
        "model": "fvs318",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "netgear",
        "version": "1.1"
      },
      {
        "model": "fvs318",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "netgear",
        "version": "1.0"
      },
      {
        "model": "mn-500",
        "scope": null,
        "trust": 0.3,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.45.7"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.44"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.43.3"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.43"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.42.7"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.42.3"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.41"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.40.2"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.39"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.38"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.37"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.36"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.35"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.05.00"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "v3"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "v2"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "v1"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "10585"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0611"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-045"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:netgear:fvs318:1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:netgear:fvs318:1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:netgear:fvs318:1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:netgear:fvs318:1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0611"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kurczaba Associates advisories\u203b advisories@kurczaba.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-045"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2004-0611",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-9041",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2004-0611",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200412-045",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-9041",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9041"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0611"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-045"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Web-Based Administration in Netgear FVS318 VPN Router allows remote attackers to cause a denial of service (no new connections) via a large number of open HTTP connections. Multiple broadband routers from several different vendors, used for home and small office Internet sharing and routing are reported affected by a denial of service vulnerability in their web-based administration interfaces. \nThe embedded web server is reportedly unable to maintain more than a small number of simultaneous TCP connections. An attacker who maintains a number of connections to port 80 of an affected device will block access to the web administration application for legitimate users. \nAn attacker could block access to the administration interface as long as they can maintain the TCP connections. \nNetgear FVS318, Linksys BEFSR41, and Microsoft MN-500 devices are reported to be susceptible. NETGEAR FVS318 is a router with VPN, Microsoft MN-500 is a wireless router. There is a problem with the embedded WEB server included by many manufacturers, and a remote attacker can use this vulnerability to conduct a denial of service attack on the management interface of the device",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0611"
      },
      {
        "db": "BID",
        "id": "10585"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9041"
      }
    ],
    "trust": 1.26
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "10585",
        "trust": 2.0
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0611",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-045",
        "trust": 0.7
      },
      {
        "db": "BUGTRAQ",
        "id": "20040621 NETGEAR FVS318 WEB-BASED ADMINISTRATION DOS",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "318",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "16462",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-9041",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9041"
      },
      {
        "db": "BID",
        "id": "10585"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0611"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-045"
      }
    ]
  },
  "id": "VAR-200412-0048",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9041"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T11:13:36.050000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0611"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/10585"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16462"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=108787199201059\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/16462"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=108787199201059\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://www.netgear.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.netgear.com/products/prod_details.asp?prodid=129"
      },
      {
        "trust": 0.3,
        "url": "http://www.netgear.com/support_main.asp"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/366823"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/366601"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=108787199201059\u0026amp;w=2"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9041"
      },
      {
        "db": "BID",
        "id": "10585"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0611"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-045"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-9041"
      },
      {
        "db": "BID",
        "id": "10585"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0611"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-045"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-12-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9041"
      },
      {
        "date": "2004-06-21T00:00:00",
        "db": "BID",
        "id": "10585"
      },
      {
        "date": "2004-12-06T05:00:00",
        "db": "NVD",
        "id": "CVE-2004-0611"
      },
      {
        "date": "2004-06-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200412-045"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9041"
      },
      {
        "date": "2009-07-12T05:16:00",
        "db": "BID",
        "id": "10585"
      },
      {
        "date": "2017-07-11T01:30:18.590000",
        "db": "NVD",
        "id": "CVE-2004-0611"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200412-045"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-045"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "WEB Management Interface Denial of Service Vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-045"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "10585"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-045"
      }
    ],
    "trust": 0.9
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…