2025-04-03 02:06:18 +00:00

385 lines
14 KiB
JSON

{
"id": "CVE-2004-0580",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-08-06T04:00:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information."
},
{
"lang": "es",
"value": "DHCP en los encaminadores de cable y ADSL Linksys BEFSR11, BEFSR41, BEFSR81 y BEFSRU31, con versi\u00f3n de firmware 1.45.7, no limpia adecuadamente b\u00faferes usados anteriormente en un paquete de respueta BOOTP, lo que permite a atacantes remotos obtener informaci\u00f3n sensible."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befcmu10:*:*:*:*:*:*:*:*",
"matchCriteriaId": "90DA95A3-DF00-411F-8582-60CB737BA116"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befn2ps4:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C888358-9CF4-4D5B-AAC0-7E606978C00E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befn2ps4:1.42.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A3FFAA33-12EC-40E4-9A34-DDB95A77A63C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr11:1.40.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BC087D32-60A2-48AD-8DD3-1088C641F880"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr11:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "4A2B43B5-0083-4F71-BD69-9EA4C0AE1ACB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr11:1.42.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6F69304C-DC53-4782-AEE0-E575B44FF56D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr11:1.42.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A7F5E5AA-6469-4405-BDE9-AD4D174A1A6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr11:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "2EA4C23A-598A-4B11-BD78-39EA55E0E6A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr11:1.43.3:*:*:*:*:*:*:*",
"matchCriteriaId": "26EE9DDF-2DCD-4432-A513-84AE9BCE94C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr11:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A867E8-F2ED-4772-BB5A-C50FFBA1B448"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr41:1.35:*:*:*:*:*:*:*",
"matchCriteriaId": "A52F18C5-6D00-493C-B38F-D6695670357F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr41:1.36:*:*:*:*:*:*:*",
"matchCriteriaId": "3F7E417D-3751-4FCF-AECC-7601F77198E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr41:1.37:*:*:*:*:*:*:*",
"matchCriteriaId": "127E79AF-33BE-485E-B4A3-058ECC898E9F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr41:1.38.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B49FC600-D1E3-4233-AC8A-DBFA87D2138D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr41:1.39:*:*:*:*:*:*:*",
"matchCriteriaId": "A0754C5C-166A-4084-A4A5-510AAC1AC6FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr41:1.40.2:*:*:*:*:*:*:*",
"matchCriteriaId": "858C8B66-8FF4-4A1E-9B2D-363AC169467E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr41:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "048E48C6-6A62-4E64-A69C-0F7B872AA121"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr41:1.42.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C0FAD3B2-69ED-451F-9CD2-6B552E962B7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr41:1.42.7:*:*:*:*:*:*:*",
"matchCriteriaId": "525E00CA-DEEA-410F-A90C-C73C8D304E36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr41:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "6337002A-EA1A-47A9-B4A5-E3EECD859C41"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr41:1.43.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E88F34EA-AFCF-4CED-A7A4-9C76309E90E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr41:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "C5219F89-4CB8-4239-A7C2-1E869E931777"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr41:1.45.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BEC6E599-5026-4580-B94F-6DD33E0952DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr41w:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC1F57E-2E8F-419C-8725-18208B8C1874"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr81:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF867F97-F14F-4056-B0C8-A72E2FE2E74D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr81:2.42.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FC5B40A4-E7CA-4BDD-899E-3693129D347E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsr81:2.44:*:*:*:*:*:*:*",
"matchCriteriaId": "7142F135-C45C-4737-BDBB-1CCF2A1827EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsru31:1.40.2:*:*:*:*:*:*:*",
"matchCriteriaId": "914AC3F4-064A-47A6-B707-00FCC0607761"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsru31:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "44405B42-D7AD-42E3-BD17-A619936DC02D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsru31:1.42.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9209ABC6-7DAA-46CE-8F59-2F9430FF2491"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsru31:1.42.7:*:*:*:*:*:*:*",
"matchCriteriaId": "958AF49D-FB97-476F-B8DF-5A760F72DBC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsru31:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "E80E4BFD-DB4D-4574-A0F6-15881A66F308"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsru31:1.43.3:*:*:*:*:*:*:*",
"matchCriteriaId": "67CC8982-FF47-45CF-8861-AD2F5A8D0E0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsru31:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "892159A1-620C-413A-ADE5-205B12E5E080"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsx41:1.42.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6353EE40-1C83-4A1A-836F-6716D95A5A88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsx41:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "2704FB57-AC43-4C92-B038-8C226C8A47B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsx41:1.43.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BDD7A706-C379-4D56-97CA-88D3F76D4EF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsx41:1.43.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0D0F2944-C902-4652-85FA-9223773D53DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsx41:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "90E9B1CD-FFC1-4318-BB31-6753DEF73D5A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsx41:1.44.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EFD70A-34B4-4F27-9377-A665505895D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befsx41:1.45.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1B23D8CA-A966-4E23-B6D2-4E7AAD239543"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befvp41:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A513272D-E013-498F-8582-0645DB3366F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befvp41:1.39.64:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADD86DE-4495-4C95-9C32-294442915A85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befvp41:1.40.3f:*:*:*:*:*:*:*",
"matchCriteriaId": "DFB5F870-AE5C-4B0E-AEEA-335A990E6EA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befvp41:1.40.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C359F33C-D4B0-4C22-8CEE-86F6FE8A1987"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:befvp41:1.42.7:*:*:*:*:*:*:*",
"matchCriteriaId": "56484A79-0B44-439F-A64B-B55660E0C7FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:rv082:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88647EC9-AD63-4643-B1B9-C0C224E6F93B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:wap55ag:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "935294D7-41A5-4E47-A168-A908E61CADCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:wrt54g:1.42.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51DC73D9-CBB8-4683-BB21-3AA0F9468F18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:wrt54g:2.00.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF3AB9D-CE52-42CF-9FD7-ECB83495C3AE"
}
]
}
]
}
],
"references": [
{
"url": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832&p_%20%5Ccreated=1086294093&p_sid=pU1X1idh&p_lva=&p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20%5CJnBfcm93X2NudD02NTQmcF9wYWdlPTE%2A&p_li=",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=108662876129301&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/11606",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/alerts/2004/May/1010288.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/6325",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/10329",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16142",
"source": "cve@mitre.org"
},
{
"url": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832&p_%20%5Ccreated=1086294093&p_sid=pU1X1idh&p_lva=&p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20%5CJnBfcm93X2NudD02NTQmcF9wYWdlPTE%2A&p_li=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://marc.info/?l=bugtraq&m=108662876129301&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/11606",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securitytracker.com/alerts/2004/May/1010288.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.osvdb.org/6325",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/10329",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16142",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}