Linksys Router Exploit Fix
Omega65
Philadelphia, Pa
The Linksys Router Remote Sniffing Exploit vulnerability that The Inq reported on has been fixed. Follow the Link for the story and links to Updates
Source: The Inquirer
Whew! Patches applied!Original Story: Linksys routers may be open to remote sniffing
FOLKS AT security portal SecuriTeam published on May 17 an exploit that could allow hackers and other nasty people to remotely sniff traffic passing through the router, and also crash the device.
The article says it all comes down to a "memory leak", causing a flaw in the way the Linksys routers' DHCP server returns BOOTP protocol packets. This exploit is currently listed at position #3 in the SecuriTeam.com front page, so expect lots of script kiddies to be playing with it as we write (and you read) this.
The site says: "Instead of returning legitimate BOOTP responses, (the linksys units) return BOOTP responses with the BOOTP fields filled in with portions of memory. This allows you to do cool things like the equivalent of sniffing all the traffic to/from the device". It continues: "I have successfully used this technique to steal the admin username and password from an innocent third party who recently configured the device, and I watched someone's traffic as they browsed ebay for a new Ti-Book".
Source: The Inquirer
0
Comments
I tried the utility and the method within the router software. Could it be that it's because I don't have version 3 of the hardware?
For the v1 router run the setup wizard
Both Zips include the instruction.doc, Setup wizard and the appropriate *.bin file Link to post with files (the zip files don't show up on S-M.com)
It's nice to feel a little safer, I certainly rely on my router as the first line of defense.