Search criteria

3 vulnerabilities found for rv082 by linksys

VAR-200408-0079

Vulnerability from variot - Updated: 2025-04-03 22:26

DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information. Linksys has a variety of network equipment product lines.

Multiple Linksys devices have problems processing DHCP messages. Remote attackers can use this vulnerability to obtain sensitive information or conduct denial of service attacks on the device.

The built-in DHCP server of these devices has a security vulnerability. The DHCP server of these devices incorrectly processes BOOTP packets. When returning a BOOTP response, it fills some of the information in the memory into the BOOTP field, so the attacker can gain sensitivity by sniffing network communications. Information can also lead to a denial of service attack on the device by an attacker. When attempting to exploit this issue, it has been reported that a denial of service condition may occur, stopping legitimate users from using the device

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200408-0079",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "befn2ps4",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "linksys",
        "version": "1.42.7"
      },
      {
        "model": "befsr11",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "1.43"
      },
      {
        "model": "befsr11",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "1.44"
      },
      {
        "model": "befsr11",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "1.41"
      },
      {
        "model": "befsr11",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "1.42.7"
      },
      {
        "model": "befsr11",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "1.40.2"
      },
      {
        "model": "befsr11",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "1.43.3"
      },
      {
        "model": "befsr11",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "1.42.3"
      },
      {
        "model": "wap55ag",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "linksys",
        "version": "1.0.7"
      },
      {
        "model": "befvp41",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "linksys",
        "version": "1.42.7"
      },
      {
        "model": "befvp41",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "linksys",
        "version": "1.40.4"
      },
      {
        "model": "befsx41",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "linksys",
        "version": "1.45.3"
      },
      {
        "model": "befsx41",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "linksys",
        "version": "1.44.3"
      },
      {
        "model": "befsx41",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "linksys",
        "version": "1.44"
      },
      {
        "model": "befsx41",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "linksys",
        "version": "1.43.4"
      },
      {
        "model": "befsx41",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "linksys",
        "version": "1.43.3"
      },
      {
        "model": "befsx41",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "linksys",
        "version": "1.43"
      },
      {
        "model": "befsx41",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "linksys",
        "version": "1.42.7"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.41"
      },
      {
        "model": "befsr41w",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "*"
      },
      {
        "model": "befsr81",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "*"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.42.7"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.42.3"
      },
      {
        "model": "befcmu10",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "*"
      },
      {
        "model": "befsr81",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "2.42.7.1"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.40.2"
      },
      {
        "model": "rv082",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "*"
      },
      {
        "model": "befsru31",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.44"
      },
      {
        "model": "befsru31",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.43.3"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.45.7"
      },
      {
        "model": "befsru31",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.43"
      },
      {
        "model": "befvp41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.40.3f"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.38.5"
      },
      {
        "model": "wrt54g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "2.00.8"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.39"
      },
      {
        "model": "wrt54g",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.42.3"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.35"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.36"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.37"
      },
      {
        "model": "befvp41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.39.64"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.44"
      },
      {
        "model": "befvp41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "*"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.43.3"
      },
      {
        "model": "befsru31",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.41"
      },
      {
        "model": "befsru31",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.42.7"
      },
      {
        "model": "befsr41",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.43"
      },
      {
        "model": "befn2ps4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "*"
      },
      {
        "model": "befsru31",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.42.3"
      },
      {
        "model": "befsr81",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "2.44"
      },
      {
        "model": "befsru31",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "1.40.2"
      },
      {
        "model": "befcmu10",
        "scope": null,
        "trust": 0.9,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.6,
        "vendor": "none",
        "version": null
      },
      {
        "model": "befn2ps4",
        "scope": null,
        "trust": 0.6,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": "wrt54g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "v2.02.00.8"
      },
      {
        "model": "wpc300n wireless-n notebook adapter",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "-4.100.15.5"
      },
      {
        "model": "rv082",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": "etherfast befvp41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.39.64"
      },
      {
        "model": "etherfast befvp41 router",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": "etherfast befsru31 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.44"
      },
      {
        "model": "etherfast befsru31 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.43.3"
      },
      {
        "model": "etherfast befsru31 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.43"
      },
      {
        "model": "etherfast befsru31 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.42.7"
      },
      {
        "model": "etherfast befsru31 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.42.3"
      },
      {
        "model": "etherfast befsru31 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.41"
      },
      {
        "model": "etherfast befsru31 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.40.2"
      },
      {
        "model": "etherfast befsr81 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "2.44"
      },
      {
        "model": "etherfast befsr81 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "2.42.7"
      },
      {
        "model": "etherfast befsr81 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "2.42.7.1"
      },
      {
        "model": "etherfast befsr81 router",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.45.7"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.44"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.43.3"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.43"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.42.7"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.42.3"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.41"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.40.2"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.39"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.38"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.37"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.36"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.35"
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.38.5"
      },
      {
        "model": "etherfast befsr11 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.44"
      },
      {
        "model": "etherfast befsr11 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.43.3"
      },
      {
        "model": "etherfast befsr11 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.43"
      },
      {
        "model": "etherfast befsr11 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.42.7"
      },
      {
        "model": "etherfast befsr11 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.42.3"
      },
      {
        "model": "etherfast befsr11 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.41"
      },
      {
        "model": "etherfast befsr11 router",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.40.2"
      },
      {
        "model": "etherfast befn2ps4 router",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": "befvp41 .3f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.40"
      },
      {
        "model": "befsr81",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": "befsr41w",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": "etherfast befsr41 router",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.05.00"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2004-1417"
      },
      {
        "db": "BID",
        "id": "10329"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-030"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0580"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Jon Hart\u203b warchild@spoofed.org",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-030"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2004-0580",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2004-0580",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-9010",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2004-0580",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200408-030",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-9010",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9010"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-030"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0580"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information. Linksys has a variety of network equipment product lines. \n\n\u00a0Multiple Linksys devices have problems processing DHCP messages. Remote attackers can use this vulnerability to obtain sensitive information or conduct denial of service attacks on the device. \n\n\u00a0The built-in DHCP server of these devices has a security vulnerability. The DHCP server of these devices incorrectly processes BOOTP packets. When returning a BOOTP response, it fills some of the information in the memory into the BOOTP field, so the attacker can gain sensitivity by sniffing network communications. Information can also lead to a denial of service attack on the device by an attacker. When attempting to exploit this issue, it has been reported that a denial of service condition may occur, stopping legitimate users from using the device",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0580"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2004-1417"
      },
      {
        "db": "BID",
        "id": "10329"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9010"
      }
    ],
    "trust": 1.8
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-9010",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9010"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2004-0580",
        "trust": 2.6
      },
      {
        "db": "BID",
        "id": "10329",
        "trust": 2.0
      },
      {
        "db": "OSVDB",
        "id": "6325",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1010288",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "11606",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-030",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2004-1417",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20040607 LINKSYS BEFSR41 DHCP VULNERABILITY SERVER LEAKS NETWORK DATA",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "16142",
        "trust": 0.6
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-77851",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "24115",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-9010",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2004-1417"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9010"
      },
      {
        "db": "BID",
        "id": "10329"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-030"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0580"
      }
    ]
  },
  "id": "VAR-200408-0079",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9010"
      }
    ],
    "trust": 0.6353147
  },
  "last_update_date": "2025-04-03T22:26:17.776000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0580"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/10329"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/6325"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/alerts/2004/may/1010288.html"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/11606"
      },
      {
        "trust": 1.6,
        "url": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832\u0026p_%20%5ccreated=1086294093\u0026p_sid=pu1x1idh\u0026p_lva=\u0026p_sp=cf9zcmnopszwx3nvcnrfynk9jnbfz3jpzhnvcnq9%20%5cjnbfcm93x2nudd02ntqmcf9wywdlpte%2a\u0026p_li="
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16142"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=108662876129301\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/16142"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=108662876129301\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832\u0026p_created=1086294093\u0026p_sid=pu1x1idh\u0026p_lva=\u0026p_sp=cf9zcmnopszwx3nvcnrfynk9jnbfz3jpzhnvcnq9jnbfcm93x2nudd02ntqmcf9wywdl"
      },
      {
        "trust": 0.3,
        "url": "http://www.linksys.com/products/group.asp?grid=23"
      },
      {
        "trust": 0.3,
        "url": "http://www.linksys.com/"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365319"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=108662876129301\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832\u0026amp;p_%20%5ccreated=1086294093\u0026amp;p_sid=pu1x1idh\u0026amp;p_lva=\u0026amp;p_sp=cf9zcmnopszwx3nvcnrfynk9jnbfz3jpzhnvcnq9%20%5cjnbfcm93x2nudd02ntqmcf9wywdlpte%2a\u0026amp;p_li="
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9010"
      },
      {
        "db": "BID",
        "id": "10329"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-030"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0580"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2004-1417"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9010"
      },
      {
        "db": "BID",
        "id": "10329"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-030"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0580"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-05-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2004-1417"
      },
      {
        "date": "2004-08-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9010"
      },
      {
        "date": "2004-05-13T00:00:00",
        "db": "BID",
        "id": "10329"
      },
      {
        "date": "2004-05-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200408-030"
      },
      {
        "date": "2004-08-06T04:00:00",
        "db": "NVD",
        "id": "CVE-2004-0580"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-05-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2004-1417"
      },
      {
        "date": "2018-08-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9010"
      },
      {
        "date": "2015-03-19T09:44:00",
        "db": "BID",
        "id": "10329"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200408-030"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2004-0580"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-030"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple Linksys Device DHCP Information Leaks and Denial of Service Vulnerabilities",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2004-1417"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "10329"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200408-030"
      }
    ],
    "trust": 0.9
  }
}

CVE-2004-0580 (GCVE-0-2004-0580)

Vulnerability from nvd – Published: 2004-06-23 04:00 – Updated: 2024-08-08 00:24
VLAI?
Summary
DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://linksys.custhelp.com/cgi-bin/linksys.cfg/p… x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/11606 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/6325 vdb-entryx_refsource_OSVDB
http://securitytracker.com/alerts/2004/May/1010288.html vdb-entryx_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=108662876129301&w=2 mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/bid/10329 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:24:26.462Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832\u0026p_%20%5Ccreated=1086294093\u0026p_sid=pU1X1idh\u0026p_lva=\u0026p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20%5CJnBfcm93X2NudD02NTQmcF9wYWdlPTE%2A\u0026p_li="
          },
          {
            "name": "linksys-etherfast-bootp-dos(16142)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16142"
          },
          {
            "name": "11606",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/11606"
          },
          {
            "name": "6325",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/6325"
          },
          {
            "name": "1010288",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/alerts/2004/May/1010288.html"
          },
          {
            "name": "20040607 Linksys BEFSR41 DHCP vulnerability server leaks network data",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=108662876129301\u0026w=2"
          },
          {
            "name": "10329",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10329"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-06-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832\u0026p_%20%5Ccreated=1086294093\u0026p_sid=pU1X1idh\u0026p_lva=\u0026p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20%5CJnBfcm93X2NudD02NTQmcF9wYWdlPTE%2A\u0026p_li="
        },
        {
          "name": "linksys-etherfast-bootp-dos(16142)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16142"
        },
        {
          "name": "11606",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/11606"
        },
        {
          "name": "6325",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/6325"
        },
        {
          "name": "1010288",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/alerts/2004/May/1010288.html"
        },
        {
          "name": "20040607 Linksys BEFSR41 DHCP vulnerability server leaks network data",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=108662876129301\u0026w=2"
        },
        {
          "name": "10329",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10329"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0580",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832\u0026p_%20\\created=1086294093\u0026p_sid=pU1X1idh\u0026p_lva=\u0026p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20\\JnBfcm93X2NudD02NTQmcF9wYWdlPTE*\u0026p_li=",
              "refsource": "CONFIRM",
              "url": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832\u0026p_%20\\created=1086294093\u0026p_sid=pU1X1idh\u0026p_lva=\u0026p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20\\JnBfcm93X2NudD02NTQmcF9wYWdlPTE*\u0026p_li="
            },
            {
              "name": "linksys-etherfast-bootp-dos(16142)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16142"
            },
            {
              "name": "11606",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/11606"
            },
            {
              "name": "6325",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/6325"
            },
            {
              "name": "1010288",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/alerts/2004/May/1010288.html"
            },
            {
              "name": "20040607 Linksys BEFSR41 DHCP vulnerability server leaks network data",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=108662876129301\u0026w=2"
            },
            {
              "name": "10329",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10329"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0580",
    "datePublished": "2004-06-23T04:00:00",
    "dateReserved": "2004-06-18T00:00:00",
    "dateUpdated": "2024-08-08T00:24:26.462Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-0580 (GCVE-0-2004-0580)

Vulnerability from cvelistv5 – Published: 2004-06-23 04:00 – Updated: 2024-08-08 00:24
VLAI?
Summary
DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://linksys.custhelp.com/cgi-bin/linksys.cfg/p… x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/11606 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/6325 vdb-entryx_refsource_OSVDB
http://securitytracker.com/alerts/2004/May/1010288.html vdb-entryx_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=108662876129301&w=2 mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/bid/10329 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:24:26.462Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832\u0026p_%20%5Ccreated=1086294093\u0026p_sid=pU1X1idh\u0026p_lva=\u0026p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20%5CJnBfcm93X2NudD02NTQmcF9wYWdlPTE%2A\u0026p_li="
          },
          {
            "name": "linksys-etherfast-bootp-dos(16142)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16142"
          },
          {
            "name": "11606",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/11606"
          },
          {
            "name": "6325",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/6325"
          },
          {
            "name": "1010288",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/alerts/2004/May/1010288.html"
          },
          {
            "name": "20040607 Linksys BEFSR41 DHCP vulnerability server leaks network data",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=108662876129301\u0026w=2"
          },
          {
            "name": "10329",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10329"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-06-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832\u0026p_%20%5Ccreated=1086294093\u0026p_sid=pU1X1idh\u0026p_lva=\u0026p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20%5CJnBfcm93X2NudD02NTQmcF9wYWdlPTE%2A\u0026p_li="
        },
        {
          "name": "linksys-etherfast-bootp-dos(16142)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16142"
        },
        {
          "name": "11606",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/11606"
        },
        {
          "name": "6325",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/6325"
        },
        {
          "name": "1010288",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/alerts/2004/May/1010288.html"
        },
        {
          "name": "20040607 Linksys BEFSR41 DHCP vulnerability server leaks network data",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=108662876129301\u0026w=2"
        },
        {
          "name": "10329",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10329"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0580",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832\u0026p_%20\\created=1086294093\u0026p_sid=pU1X1idh\u0026p_lva=\u0026p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20\\JnBfcm93X2NudD02NTQmcF9wYWdlPTE*\u0026p_li=",
              "refsource": "CONFIRM",
              "url": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832\u0026p_%20\\created=1086294093\u0026p_sid=pU1X1idh\u0026p_lva=\u0026p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20\\JnBfcm93X2NudD02NTQmcF9wYWdlPTE*\u0026p_li="
            },
            {
              "name": "linksys-etherfast-bootp-dos(16142)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16142"
            },
            {
              "name": "11606",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/11606"
            },
            {
              "name": "6325",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/6325"
            },
            {
              "name": "1010288",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/alerts/2004/May/1010288.html"
            },
            {
              "name": "20040607 Linksys BEFSR41 DHCP vulnerability server leaks network data",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=108662876129301\u0026w=2"
            },
            {
              "name": "10329",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10329"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0580",
    "datePublished": "2004-06-23T04:00:00",
    "dateReserved": "2004-06-18T00:00:00",
    "dateUpdated": "2024-08-08T00:24:26.462Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}