VAR-200810-0303

Vulnerability from variot - Updated: 2023-12-18 13:58

The Marvell driver for the Linksys WAP4400N Wi-Fi access point with firmware 1.2.14 on the Marvell 88W8361P-BEM1 chipset, when WEP mode is enabled, does not properly parse malformed 802.11 frames, which allows remote attackers to cause a denial of service (reboot or hang-up) via a malformed association request containing the WEP flag, as demonstrated by a request that is too short, a different vulnerability than CVE-2008-1144 and CVE-2008-1197. Linksys WAP4400N wireless access point devices are prone to a denial-of-service vulnerability because they fail to adequately verify user-supplied input. Remote attackers can exploit this issue to hang or reboot a vulnerable device, denying service to legitimate users. Attackers may also be able to run arbitrary code, but this has not been confirmed. Linksys WAP4400N devices running firmware 1.2.14 are vulnerable. NOTE: Since the flaw is in the Marvell 88W8361P-BEM1 chipset driver, other devices and firmware versions using the same code may also be affected. Linksys WAP4400N is a small wireless router.

Assigned CVE:

  • CVE-2008-4441

Details:

  • The bug can be triggered thanks to a malformed association request which is typically too short (truncated). Any association request sent in the air by the attacker will be parsed by the access point wireless driver and thus may trigger some implementation bugs.

Attack Impact:

  • Denial-of-service (reboot or hang-up) and possibly remote arbitrary code execution

Attack Vector:

  • Unauthenticated wireless device

Timeline:

  • 2008-05-26 - Vulnerability reported to Linksys
  • 2008-05-26 - Full details sent to Linksys
  • 2008-10-13 - Public disclosure

Affected Products:

  • Linksys WAP4400N (firmware v1.2.14) with MARVELL 88W8361P-BEM1 chipset

Vulnerable Devices:

  • As it is a wireless driver specific issue, the wireless vendor should use the latest chipset wireless driver for their access point firmwares. This security vulnerability was reported to Linksys, updated firmwares (such as the 1.2.17 firmware) should be available on their web site. Any other wireless device relying on this vulnerable wireless driver is likely to be vulnerable. ----------------------------------------------------------------------

Do you need accurate and reliable IDS / IPS / AV detection rules?

Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/


TITLE: Linksys WAP4400N Denial of Service and SNMPv3 Vulnerability

SECUNIA ADVISORY ID: SA32259

VERIFY ADVISORY: http://secunia.com/advisories/32259/

CRITICAL: Moderately critical

IMPACT: Unknown, DoS

WHERE:

From remote

OPERATING SYSTEM: Linksys WAP4400N http://secunia.com/advisories/product/20144/

DESCRIPTION: Some vulnerabilities have been reported in Linksys WAP4400N, where one has unknown impacts and the other can be exploited by malicious people to cause a DoS (Denial of Service).

1) An error within the processing of association requests can be exploited to reboot or hang-up the device by sending a specially crafted association request.

Successful exploitation requires that the access point runs in WEP mode.

2) An unspecified vulnerability exists within SNMPv3. No more information is currently available.

SOLUTION: Update to firmware version 1.2.17. http://www.linksys.com/servlet/Satellite?c=L_Download_C2&childpagename=US%2FLayout&cid=1115417109974&packedargs=sku%3D1152745215776&pagename=Linksys%2FCommon%2FVisitorWrapper

PROVIDED AND/OR DISCOVERED BY: 1) Laurent Butti and Julien Tinnes, France Telecom / Orange 2) Reported by the vendor.

ORIGINAL ADVISORY: http://www.linksys.com/servlet/Satellite?c=L_Download_C2&childpagename=US%2FLayout&cid=1115417109974&packedargs=sku%3D1152745215776&pagename=Linksys%2FCommon%2FVisitorWrapper


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200810-0303",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wap400n",
        "scope": "eq",
        "trust": 1.7,
        "vendor": "linksys",
        "version": "1.2.14"
      },
      {
        "model": "wap400n",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco linksys",
        "version": "1.2.14"
      },
      {
        "model": "semiconductor 88w8361p-bem1 chipset",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "marvell",
        "version": "0"
      },
      {
        "model": "wap4400n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.2.14"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2008-4441"
      },
      {
        "db": "BID",
        "id": "31742"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004926"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-229"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:linksys:wap400n:1.2.14:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:marvell:88w8361p-bem1:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-4441"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Laurent Butti\u203b laurent.butti@orange-ftgroup.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-229"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2008-4441",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.1,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2008-4441",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-34566",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2008-4441",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200810-229",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-34566",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2008-4441",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-34566"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-4441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004926"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-229"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Marvell driver for the Linksys WAP4400N Wi-Fi access point with firmware 1.2.14 on the Marvell 88W8361P-BEM1 chipset, when WEP mode is enabled, does not properly parse malformed 802.11 frames, which allows remote attackers to cause a denial of service (reboot or hang-up) via a malformed association request containing the WEP flag, as demonstrated by a request that is too short, a different vulnerability than CVE-2008-1144 and CVE-2008-1197. Linksys WAP4400N wireless access point devices are prone to a denial-of-service vulnerability because they fail to adequately verify user-supplied input. \nRemote attackers can exploit this issue to hang or reboot a vulnerable device, denying service to legitimate users. Attackers may also be able to run arbitrary code, but this has not been confirmed. \nLinksys WAP4400N devices running firmware 1.2.14 are vulnerable. \nNOTE: Since the flaw is in the Marvell 88W8361P-BEM1 chipset driver, other devices and firmware versions using the same code may also be affected. Linksys WAP4400N is a small wireless router. \n\nAssigned CVE:\n-------------\n* CVE-2008-4441\n\nDetails:\n--------\n* The bug can be triggered thanks to a malformed association request\nwhich is typically too short (truncated). Any association request sent\nin the air by the attacker will be parsed by the access point wireless\ndriver and thus may trigger some implementation bugs. \n\nAttack Impact:\n--------------\n* Denial-of-service (reboot or hang-up) and possibly remote arbitrary\ncode execution\n\nAttack Vector:\n--------------\n* Unauthenticated wireless device\n\nTimeline:\n---------\n* 2008-05-26 - Vulnerability reported to Linksys\n* 2008-05-26 - Full details sent to Linksys\n* 2008-10-13 - Public disclosure\n\nAffected Products:\n------------------\n* Linksys WAP4400N (firmware v1.2.14) with MARVELL 88W8361P-BEM1 chipset\n\nVulnerable Devices:\n-------------------\n* As it is a wireless driver specific issue, the wireless vendor should\nuse the latest chipset wireless driver for their access point firmwares. \nThis security vulnerability was reported to Linksys, updated firmwares\n(such as the 1.2.17 firmware) should be available on their web site. Any\nother wireless device relying on this vulnerable wireless driver is\nlikely to be vulnerable. ----------------------------------------------------------------------\n\nDo you need accurate and reliable IDS / IPS / AV detection rules?\n\nGet in-depth vulnerability details:\nhttp://secunia.com/binary_analysis/sample_analysis/\n\n----------------------------------------------------------------------\n\nTITLE:\nLinksys WAP4400N Denial of Service and SNMPv3 Vulnerability\n\nSECUNIA ADVISORY ID:\nSA32259\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/32259/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nUnknown, DoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nLinksys WAP4400N\nhttp://secunia.com/advisories/product/20144/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Linksys WAP4400N, where\none has unknown impacts and the other can be exploited by malicious\npeople to cause a DoS (Denial of Service). \n\n1) An error within the processing of association requests can be\nexploited to reboot or hang-up the device by sending a specially\ncrafted association request. \n\nSuccessful exploitation requires that the access point runs in WEP\nmode. \n\n2) An unspecified vulnerability exists within SNMPv3. No more\ninformation is currently available. \n\nSOLUTION:\nUpdate to firmware version 1.2.17. \nhttp://www.linksys.com/servlet/Satellite?c=L_Download_C2\u0026childpagename=US%2FLayout\u0026cid=1115417109974\u0026packedargs=sku%3D1152745215776\u0026pagename=Linksys%2FCommon%2FVisitorWrapper\n\nPROVIDED AND/OR DISCOVERED BY:\n1) Laurent Butti and Julien Tinnes, France Telecom / Orange\n2) Reported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.linksys.com/servlet/Satellite?c=L_Download_C2\u0026childpagename=US%2FLayout\u0026cid=1115417109974\u0026packedargs=sku%3D1152745215776\u0026pagename=Linksys%2FCommon%2FVisitorWrapper\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-4441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004926"
      },
      {
        "db": "BID",
        "id": "31742"
      },
      {
        "db": "VULHUB",
        "id": "VHN-34566"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-4441"
      },
      {
        "db": "PACKETSTORM",
        "id": "70876"
      },
      {
        "db": "PACKETSTORM",
        "id": "70926"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2008-4441",
        "trust": 3.0
      },
      {
        "db": "BID",
        "id": "31742",
        "trust": 2.1
      },
      {
        "db": "SECUNIA",
        "id": "32259",
        "trust": 1.9
      },
      {
        "db": "SREASON",
        "id": "4400",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-2805",
        "trust": 1.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004926",
        "trust": 0.8
      },
      {
        "db": "BUGTRAQ",
        "id": "20081013 MARVELL DRIVER MALFORMED ASSOCIATION REQUEST VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "45841",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "4400",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-229",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "70876",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-34566",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-4441",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "70926",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-34566"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-4441"
      },
      {
        "db": "BID",
        "id": "31742"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004926"
      },
      {
        "db": "PACKETSTORM",
        "id": "70876"
      },
      {
        "db": "PACKETSTORM",
        "id": "70926"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-229"
      }
    ]
  },
  "id": "VAR-200810-0303",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-34566"
      }
    ],
    "trust": 0.7
  },
  "last_update_date": "2023-12-18T13:58:10.555000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Linksys",
        "trust": 0.8,
        "url": "http://home.cisco.com/en-apac/home"
      },
      {
        "title": "wifuzzit",
        "trust": 0.1,
        "url": "https://github.com/0xd012/wifuzzit "
      },
      {
        "title": "wifuzzit",
        "trust": 0.1,
        "url": "https://github.com/flowerhack/wifuzzit "
      },
      {
        "title": "wifuzzit",
        "trust": 0.1,
        "url": "https://github.com/84kaliplexon3/wifuzzit "
      },
      {
        "title": "wifuzzit",
        "trust": 0.1,
        "url": "https://github.com/plexone2019/wifuzzit "
      },
      {
        "title": "wifuzzit",
        "trust": 0.1,
        "url": "https://github.com/wi-fi-analyzer/wifuzzit "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2008-4441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004926"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-34566"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004926"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4441"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/31742"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/32259"
      },
      {
        "trust": 1.8,
        "url": "http://securityreason.com/securityalert/4400"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/497285/100/0/threaded"
      },
      {
        "trust": 1.2,
        "url": "http://www.vupen.com/english/advisories/2008/2805"
      },
      {
        "trust": 1.2,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45841"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4441"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4441"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/45841"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/497285/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2008/2805"
      },
      {
        "trust": 0.3,
        "url": "http://www.marvell.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.linksys.com/servlet/satellite?c=l_product_c2\u0026childpagename=us%2flayout\u0026cid=1153780863744\u0026pagename=linksys%2fcommon%2fvisitorwrapper\u0026lid=6374487090b05"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/497285"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/20.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/0xd012/wifuzzit"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-4441"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/20144/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/binary_analysis/sample_analysis/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/32259/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://www.linksys.com/servlet/satellite?c=l_download_c2\u0026childpagename=us%2flayout\u0026cid=1115417109974\u0026packedargs=sku%3d1152745215776\u0026pagename=linksys%2fcommon%2fvisitorwrapper"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-34566"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-4441"
      },
      {
        "db": "BID",
        "id": "31742"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004926"
      },
      {
        "db": "PACKETSTORM",
        "id": "70876"
      },
      {
        "db": "PACKETSTORM",
        "id": "70926"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-229"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-34566"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-4441"
      },
      {
        "db": "BID",
        "id": "31742"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004926"
      },
      {
        "db": "PACKETSTORM",
        "id": "70876"
      },
      {
        "db": "PACKETSTORM",
        "id": "70926"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-229"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-10-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-34566"
      },
      {
        "date": "2008-10-14T00:00:00",
        "db": "VULMON",
        "id": "CVE-2008-4441"
      },
      {
        "date": "2008-10-13T00:00:00",
        "db": "BID",
        "id": "31742"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-004926"
      },
      {
        "date": "2008-10-13T22:41:20",
        "db": "PACKETSTORM",
        "id": "70876"
      },
      {
        "date": "2008-10-15T06:24:30",
        "db": "PACKETSTORM",
        "id": "70926"
      },
      {
        "date": "2008-10-14T15:28:16.677000",
        "db": "NVD",
        "id": "CVE-2008-4441"
      },
      {
        "date": "2008-10-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200810-229"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-34566"
      },
      {
        "date": "2018-10-11T00:00:00",
        "db": "VULMON",
        "id": "CVE-2008-4441"
      },
      {
        "date": "2008-10-16T17:27:00",
        "db": "BID",
        "id": "31742"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-004926"
      },
      {
        "date": "2018-10-11T20:51:51.227000",
        "db": "NVD",
        "id": "CVE-2008-4441"
      },
      {
        "date": "2009-01-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200810-229"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-229"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linksys WAP4400N Wi-Fi Service interruption at the access point  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004926"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200810-229"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…