Search criteria
6 vulnerabilities found for wap400n by linksys
VAR-200810-0303
Vulnerability from variot - Updated: 2025-04-10 20:41The Marvell driver for the Linksys WAP4400N Wi-Fi access point with firmware 1.2.14 on the Marvell 88W8361P-BEM1 chipset, when WEP mode is enabled, does not properly parse malformed 802.11 frames, which allows remote attackers to cause a denial of service (reboot or hang-up) via a malformed association request containing the WEP flag, as demonstrated by a request that is too short, a different vulnerability than CVE-2008-1144 and CVE-2008-1197. Linksys WAP4400N wireless access point devices are prone to a denial-of-service vulnerability because they fail to adequately verify user-supplied input. Remote attackers can exploit this issue to hang or reboot a vulnerable device, denying service to legitimate users. Attackers may also be able to run arbitrary code, but this has not been confirmed. Linksys WAP4400N devices running firmware 1.2.14 are vulnerable. NOTE: Since the flaw is in the Marvell 88W8361P-BEM1 chipset driver, other devices and firmware versions using the same code may also be affected. Linksys WAP4400N is a small wireless router.
Assigned CVE:
- CVE-2008-4441
Details:
- The bug can be triggered thanks to a malformed association request which is typically too short (truncated). Any association request sent in the air by the attacker will be parsed by the access point wireless driver and thus may trigger some implementation bugs.
Attack Impact:
- Denial-of-service (reboot or hang-up) and possibly remote arbitrary code execution
Attack Vector:
- Unauthenticated wireless device
Timeline:
- 2008-05-26 - Vulnerability reported to Linksys
- 2008-05-26 - Full details sent to Linksys
- 2008-10-13 - Public disclosure
Affected Products:
- Linksys WAP4400N (firmware v1.2.14) with MARVELL 88W8361P-BEM1 chipset
Vulnerable Devices:
- As it is a wireless driver specific issue, the wireless vendor should use the latest chipset wireless driver for their access point firmwares. This security vulnerability was reported to Linksys, updated firmwares (such as the 1.2.17 firmware) should be available on their web site. Any other wireless device relying on this vulnerable wireless driver is likely to be vulnerable. ----------------------------------------------------------------------
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/
TITLE: Linksys WAP4400N Denial of Service and SNMPv3 Vulnerability
SECUNIA ADVISORY ID: SA32259
VERIFY ADVISORY: http://secunia.com/advisories/32259/
CRITICAL: Moderately critical
IMPACT: Unknown, DoS
WHERE:
From remote
OPERATING SYSTEM: Linksys WAP4400N http://secunia.com/advisories/product/20144/
DESCRIPTION: Some vulnerabilities have been reported in Linksys WAP4400N, where one has unknown impacts and the other can be exploited by malicious people to cause a DoS (Denial of Service).
1) An error within the processing of association requests can be exploited to reboot or hang-up the device by sending a specially crafted association request.
Successful exploitation requires that the access point runs in WEP mode.
2) An unspecified vulnerability exists within SNMPv3. No more information is currently available.
SOLUTION: Update to firmware version 1.2.17. http://www.linksys.com/servlet/Satellite?c=L_Download_C2&childpagename=US%2FLayout&cid=1115417109974&packedargs=sku%3D1152745215776&pagename=Linksys%2FCommon%2FVisitorWrapper
PROVIDED AND/OR DISCOVERED BY: 1) Laurent Butti and Julien Tinnes, France Telecom / Orange 2) Reported by the vendor.
ORIGINAL ADVISORY: http://www.linksys.com/servlet/Satellite?c=L_Download_C2&childpagename=US%2FLayout&cid=1115417109974&packedargs=sku%3D1152745215776&pagename=Linksys%2FCommon%2FVisitorWrapper
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200810-0303",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wap400n",
"scope": "eq",
"trust": 1.7,
"vendor": "linksys",
"version": "1.2.14"
},
{
"model": "wap400n",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco linksys",
"version": "1.2.14"
},
{
"model": "semiconductor 88w8361p-bem1 chipset",
"scope": "eq",
"trust": 0.3,
"vendor": "marvell",
"version": "0"
},
{
"model": "wap4400n",
"scope": "eq",
"trust": 0.3,
"vendor": "linksys",
"version": "1.2.14"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2008-4441"
},
{
"db": "BID",
"id": "31742"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004926"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-229"
},
{
"db": "NVD",
"id": "CVE-2008-4441"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:linksys:wap400n",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-004926"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Laurent Butti\u203b laurent.butti@orange-ftgroup.com",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200810-229"
}
],
"trust": 0.6
},
"cve": "CVE-2008-4441",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2008-4441",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-34566",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2008-4441",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2008-4441",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200810-229",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-34566",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2008-4441",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-34566"
},
{
"db": "VULMON",
"id": "CVE-2008-4441"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004926"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-229"
},
{
"db": "NVD",
"id": "CVE-2008-4441"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Marvell driver for the Linksys WAP4400N Wi-Fi access point with firmware 1.2.14 on the Marvell 88W8361P-BEM1 chipset, when WEP mode is enabled, does not properly parse malformed 802.11 frames, which allows remote attackers to cause a denial of service (reboot or hang-up) via a malformed association request containing the WEP flag, as demonstrated by a request that is too short, a different vulnerability than CVE-2008-1144 and CVE-2008-1197. Linksys WAP4400N wireless access point devices are prone to a denial-of-service vulnerability because they fail to adequately verify user-supplied input. \nRemote attackers can exploit this issue to hang or reboot a vulnerable device, denying service to legitimate users. Attackers may also be able to run arbitrary code, but this has not been confirmed. \nLinksys WAP4400N devices running firmware 1.2.14 are vulnerable. \nNOTE: Since the flaw is in the Marvell 88W8361P-BEM1 chipset driver, other devices and firmware versions using the same code may also be affected. Linksys WAP4400N is a small wireless router. \n\nAssigned CVE:\n-------------\n* CVE-2008-4441\n\nDetails:\n--------\n* The bug can be triggered thanks to a malformed association request\nwhich is typically too short (truncated). Any association request sent\nin the air by the attacker will be parsed by the access point wireless\ndriver and thus may trigger some implementation bugs. \n\nAttack Impact:\n--------------\n* Denial-of-service (reboot or hang-up) and possibly remote arbitrary\ncode execution\n\nAttack Vector:\n--------------\n* Unauthenticated wireless device\n\nTimeline:\n---------\n* 2008-05-26 - Vulnerability reported to Linksys\n* 2008-05-26 - Full details sent to Linksys\n* 2008-10-13 - Public disclosure\n\nAffected Products:\n------------------\n* Linksys WAP4400N (firmware v1.2.14) with MARVELL 88W8361P-BEM1 chipset\n\nVulnerable Devices:\n-------------------\n* As it is a wireless driver specific issue, the wireless vendor should\nuse the latest chipset wireless driver for their access point firmwares. \nThis security vulnerability was reported to Linksys, updated firmwares\n(such as the 1.2.17 firmware) should be available on their web site. Any\nother wireless device relying on this vulnerable wireless driver is\nlikely to be vulnerable. ----------------------------------------------------------------------\n\nDo you need accurate and reliable IDS / IPS / AV detection rules?\n\nGet in-depth vulnerability details:\nhttp://secunia.com/binary_analysis/sample_analysis/\n\n----------------------------------------------------------------------\n\nTITLE:\nLinksys WAP4400N Denial of Service and SNMPv3 Vulnerability\n\nSECUNIA ADVISORY ID:\nSA32259\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/32259/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nUnknown, DoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nLinksys WAP4400N\nhttp://secunia.com/advisories/product/20144/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Linksys WAP4400N, where\none has unknown impacts and the other can be exploited by malicious\npeople to cause a DoS (Denial of Service). \n\n1) An error within the processing of association requests can be\nexploited to reboot or hang-up the device by sending a specially\ncrafted association request. \n\nSuccessful exploitation requires that the access point runs in WEP\nmode. \n\n2) An unspecified vulnerability exists within SNMPv3. No more\ninformation is currently available. \n\nSOLUTION:\nUpdate to firmware version 1.2.17. \nhttp://www.linksys.com/servlet/Satellite?c=L_Download_C2\u0026childpagename=US%2FLayout\u0026cid=1115417109974\u0026packedargs=sku%3D1152745215776\u0026pagename=Linksys%2FCommon%2FVisitorWrapper\n\nPROVIDED AND/OR DISCOVERED BY:\n1) Laurent Butti and Julien Tinnes, France Telecom / Orange\n2) Reported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.linksys.com/servlet/Satellite?c=L_Download_C2\u0026childpagename=US%2FLayout\u0026cid=1115417109974\u0026packedargs=sku%3D1152745215776\u0026pagename=Linksys%2FCommon%2FVisitorWrapper\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2008-4441"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004926"
},
{
"db": "BID",
"id": "31742"
},
{
"db": "VULHUB",
"id": "VHN-34566"
},
{
"db": "VULMON",
"id": "CVE-2008-4441"
},
{
"db": "PACKETSTORM",
"id": "70876"
},
{
"db": "PACKETSTORM",
"id": "70926"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2008-4441",
"trust": 3.1
},
{
"db": "BID",
"id": "31742",
"trust": 2.1
},
{
"db": "SECUNIA",
"id": "32259",
"trust": 1.9
},
{
"db": "SREASON",
"id": "4400",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2805",
"trust": 1.8
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004926",
"trust": 0.8
},
{
"db": "BUGTRAQ",
"id": "20081013 MARVELL DRIVER MALFORMED ASSOCIATION REQUEST VULNERABILITY",
"trust": 0.6
},
{
"db": "XF",
"id": "45841",
"trust": 0.6
},
{
"db": "XF",
"id": "4400",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200810-229",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "70876",
"trust": 0.2
},
{
"db": "OTHER",
"id": "NONE",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-34566",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2008-4441",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "70926",
"trust": 0.1
}
],
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "VULHUB",
"id": "VHN-34566"
},
{
"db": "VULMON",
"id": "CVE-2008-4441"
},
{
"db": "BID",
"id": "31742"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004926"
},
{
"db": "PACKETSTORM",
"id": "70876"
},
{
"db": "PACKETSTORM",
"id": "70926"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-229"
},
{
"db": "NVD",
"id": "CVE-2008-4441"
}
]
},
"id": "VAR-200810-0303",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "VULHUB",
"id": "VHN-34566"
}
],
"trust": 0.8
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"network device"
],
"sub_category": "Wi-Fi access point",
"trust": 0.1
}
],
"sources": [
{
"db": "OTHER",
"id": null
}
]
},
"last_update_date": "2025-04-10T20:41:28.520000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Linksys",
"trust": 0.8,
"url": "http://home.cisco.com/en-apac/home"
},
{
"title": "wifuzzit",
"trust": 0.1,
"url": "https://github.com/0xd012/wifuzzit "
},
{
"title": "wifuzzit",
"trust": 0.1,
"url": "https://github.com/flowerhack/wifuzzit "
},
{
"title": "wifuzzit",
"trust": 0.1,
"url": "https://github.com/84KaliPleXon3/wifuzzit "
},
{
"title": "wifuzzit",
"trust": 0.1,
"url": "https://github.com/PleXone2019/wifuzzit "
},
{
"title": "wifuzzit",
"trust": 0.1,
"url": "https://github.com/wi-fi-analyzer/wifuzzit "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2008-4441"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004926"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-34566"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004926"
},
{
"db": "NVD",
"id": "CVE-2008-4441"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "http://www.securityfocus.com/bid/31742"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/32259"
},
{
"trust": 1.8,
"url": "http://securityreason.com/securityalert/4400"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/archive/1/497285/100/0/threaded"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/2805"
},
{
"trust": 1.2,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45841"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4441"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4441"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/45841"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/497285/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/2805"
},
{
"trust": 0.3,
"url": "http://www.marvell.com/"
},
{
"trust": 0.3,
"url": "http://www.linksys.com/servlet/satellite?c=l_product_c2\u0026childpagename=us%2flayout\u0026cid=1153780863744\u0026pagename=linksys%2fcommon%2fvisitorwrapper\u0026lid=6374487090b05"
},
{
"trust": 0.3,
"url": "/archive/1/497285"
},
{
"trust": 0.1,
"url": "https://ieeexplore.ieee.org/abstract/document/10769424"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/20.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://github.com/0xd012/wifuzzit"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4441"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/product/20144/"
},
{
"trust": 0.1,
"url": "http://secunia.com/binary_analysis/sample_analysis/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/32259/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://www.linksys.com/servlet/satellite?c=l_download_c2\u0026childpagename=us%2flayout\u0026cid=1115417109974\u0026packedargs=sku%3d1152745215776\u0026pagename=linksys%2fcommon%2fvisitorwrapper"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "VULHUB",
"id": "VHN-34566"
},
{
"db": "VULMON",
"id": "CVE-2008-4441"
},
{
"db": "BID",
"id": "31742"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004926"
},
{
"db": "PACKETSTORM",
"id": "70876"
},
{
"db": "PACKETSTORM",
"id": "70926"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-229"
},
{
"db": "NVD",
"id": "CVE-2008-4441"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "OTHER",
"id": null
},
{
"db": "VULHUB",
"id": "VHN-34566"
},
{
"db": "VULMON",
"id": "CVE-2008-4441"
},
{
"db": "BID",
"id": "31742"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004926"
},
{
"db": "PACKETSTORM",
"id": "70876"
},
{
"db": "PACKETSTORM",
"id": "70926"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-229"
},
{
"db": "NVD",
"id": "CVE-2008-4441"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2008-10-14T00:00:00",
"db": "VULHUB",
"id": "VHN-34566"
},
{
"date": "2008-10-14T00:00:00",
"db": "VULMON",
"id": "CVE-2008-4441"
},
{
"date": "2008-10-13T00:00:00",
"db": "BID",
"id": "31742"
},
{
"date": "2012-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-004926"
},
{
"date": "2008-10-13T22:41:20",
"db": "PACKETSTORM",
"id": "70876"
},
{
"date": "2008-10-15T06:24:30",
"db": "PACKETSTORM",
"id": "70926"
},
{
"date": "2008-10-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200810-229"
},
{
"date": "2008-10-14T15:28:16.677000",
"db": "NVD",
"id": "CVE-2008-4441"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-11T00:00:00",
"db": "VULHUB",
"id": "VHN-34566"
},
{
"date": "2018-10-11T00:00:00",
"db": "VULMON",
"id": "CVE-2008-4441"
},
{
"date": "2008-10-16T17:27:00",
"db": "BID",
"id": "31742"
},
{
"date": "2012-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-004926"
},
{
"date": "2009-01-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200810-229"
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2008-4441"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200810-229"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Linksys WAP4400N Wi-Fi Service interruption at the access point (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-004926"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200810-229"
}
],
"trust": 0.6
}
}
VAR-200810-0116
Vulnerability from variot - Updated: 2025-04-10 20:10Unspecified vulnerability in the SNMPv3 component in Linksys WAP4400N firmware 1.2.14 on the Marvell Semiconductor 88W8361P-BEM1 chipset has unknown impact and attack vectors, probably remote. The Linksys WAP4400N device is a high-speed wireless access point. No detailed vulnerability details are available. The impact of this issue is currently unknown. We will update this BID when more information emerges. NOTE: Since the flaw is in the Marvell 88W8361P-BEM1 chipset driver, other devices and firmware versions using the same code may also be affected. ----------------------------------------------------------------------
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/
TITLE: Linksys WAP4400N Denial of Service and SNMPv3 Vulnerability
SECUNIA ADVISORY ID: SA32259
VERIFY ADVISORY: http://secunia.com/advisories/32259/
CRITICAL: Moderately critical
IMPACT: Unknown, DoS
WHERE:
From remote
OPERATING SYSTEM: Linksys WAP4400N http://secunia.com/advisories/product/20144/
DESCRIPTION: Some vulnerabilities have been reported in Linksys WAP4400N, where one has unknown impacts and the other can be exploited by malicious people to cause a DoS (Denial of Service).
1) An error within the processing of association requests can be exploited to reboot or hang-up the device by sending a specially crafted association request.
Successful exploitation requires that the access point runs in WEP mode. No more information is currently available. http://www.linksys.com/servlet/Satellite?c=L_Download_C2&childpagename=US%2FLayout&cid=1115417109974&packedargs=sku%3D1152745215776&pagename=Linksys%2FCommon%2FVisitorWrapper
PROVIDED AND/OR DISCOVERED BY: 1) Laurent Butti and Julien Tinnes, France Telecom / Orange 2) Reported by the vendor.
ORIGINAL ADVISORY: http://www.linksys.com/servlet/Satellite?c=L_Download_C2&childpagename=US%2FLayout&cid=1115417109974&packedargs=sku%3D1152745215776&pagename=Linksys%2FCommon%2FVisitorWrapper
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200810-0116",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wap400n",
"scope": "eq",
"trust": 1.6,
"vendor": "linksys",
"version": "1.2.14"
},
{
"model": "wap4400n",
"scope": "eq",
"trust": 0.9,
"vendor": "linksys",
"version": "1.2.14"
},
{
"model": "wap400n",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco linksys",
"version": "1.2.14"
},
{
"model": "wap4400n",
"scope": "ne",
"trust": 0.3,
"vendor": "linksys",
"version": "1.2.17"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-6230"
},
{
"db": "BID",
"id": "56356"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004953"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-292"
},
{
"db": "NVD",
"id": "CVE-2008-4594"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:linksys:wap400n",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-004953"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "56356"
}
],
"trust": 0.3
},
"cve": "CVE-2008-4594",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2008-4594",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-34719",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2008-4594",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2008-4594",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200810-292",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-34719",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-34719"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004953"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-292"
},
{
"db": "NVD",
"id": "CVE-2008-4594"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unspecified vulnerability in the SNMPv3 component in Linksys WAP4400N firmware 1.2.14 on the Marvell Semiconductor 88W8361P-BEM1 chipset has unknown impact and attack vectors, probably remote. The Linksys WAP4400N device is a high-speed wireless access point. No detailed vulnerability details are available. \nThe impact of this issue is currently unknown. We will update this BID when more information emerges. \nNOTE: Since the flaw is in the Marvell 88W8361P-BEM1 chipset driver, other devices and firmware versions using the same code may also be affected. ----------------------------------------------------------------------\n\nDo you need accurate and reliable IDS / IPS / AV detection rules?\n\nGet in-depth vulnerability details:\nhttp://secunia.com/binary_analysis/sample_analysis/\n\n----------------------------------------------------------------------\n\nTITLE:\nLinksys WAP4400N Denial of Service and SNMPv3 Vulnerability\n\nSECUNIA ADVISORY ID:\nSA32259\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/32259/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nUnknown, DoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nLinksys WAP4400N\nhttp://secunia.com/advisories/product/20144/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Linksys WAP4400N, where\none has unknown impacts and the other can be exploited by malicious\npeople to cause a DoS (Denial of Service). \n\n1) An error within the processing of association requests can be\nexploited to reboot or hang-up the device by sending a specially\ncrafted association request. \n\nSuccessful exploitation requires that the access point runs in WEP\nmode. No more\ninformation is currently available. \nhttp://www.linksys.com/servlet/Satellite?c=L_Download_C2\u0026childpagename=US%2FLayout\u0026cid=1115417109974\u0026packedargs=sku%3D1152745215776\u0026pagename=Linksys%2FCommon%2FVisitorWrapper\n\nPROVIDED AND/OR DISCOVERED BY:\n1) Laurent Butti and Julien Tinnes, France Telecom / Orange\n2) Reported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.linksys.com/servlet/Satellite?c=L_Download_C2\u0026childpagename=US%2FLayout\u0026cid=1115417109974\u0026packedargs=sku%3D1152745215776\u0026pagename=Linksys%2FCommon%2FVisitorWrapper\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2008-4594"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004953"
},
{
"db": "CNVD",
"id": "CNVD-2012-6230"
},
{
"db": "BID",
"id": "56356"
},
{
"db": "VULHUB",
"id": "VHN-34719"
},
{
"db": "PACKETSTORM",
"id": "70926"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2008-4594",
"trust": 3.4
},
{
"db": "SECUNIA",
"id": "32259",
"trust": 2.4
},
{
"db": "VUPEN",
"id": "ADV-2008-2805",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004953",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2012-6230",
"trust": 0.6
},
{
"db": "XF",
"id": "45842",
"trust": 0.6
},
{
"db": "XF",
"id": "4400",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200810-292",
"trust": 0.6
},
{
"db": "BID",
"id": "56356",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-34719",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "70926",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-6230"
},
{
"db": "VULHUB",
"id": "VHN-34719"
},
{
"db": "BID",
"id": "56356"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004953"
},
{
"db": "PACKETSTORM",
"id": "70926"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-292"
},
{
"db": "NVD",
"id": "CVE-2008-4594"
}
]
},
"id": "VAR-200810-0116",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-6230"
},
{
"db": "VULHUB",
"id": "VHN-34719"
}
],
"trust": 1.2999999999999998
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-6230"
}
]
},
"last_update_date": "2025-04-10T20:10:48.353000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Linksys",
"trust": 0.8,
"url": "http://home.cisco.com/en-apac/home"
},
{
"title": "Linksys WAP4400N SNMPv3 component has an unspecified vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/24534"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-6230"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004953"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2008-4594"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://secunia.com/advisories/32259"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2008/2805"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45842"
},
{
"trust": 1.1,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4594"
},
{
"trust": 1.0,
"url": "http://www.linksys.com/servlet/satellite?blobcol=urldata\u0026blobheadername1=content-type\u0026blobheadername2=content-disposition\u0026blobheadervalue1=application%2fmsword\u0026blobheadervalue2=inline%3b+filename"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4594"
},
{
"trust": 0.6,
"url": "http://secunia.com/advisories/32259http"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/45842"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/2805"
},
{
"trust": 0.3,
"url": "http://www.linksys.com/servlet/satellite?c=l_product_c2\u0026childpagename=us%2flayout\u0026cid=1153780863744\u0026pagename=linksys%2fcommon%2fvisitorwrapper\u0026lid=6374487090b05"
},
{
"trust": 0.1,
"url": "http://www.linksys.com/servlet/satellite?blobcol=urldata\u0026amp;blobheadername1=content-type\u0026amp;blobheadername2=content-disposition\u0026amp;blobheadervalue1=application%2fmsword\u0026amp;blobheadervalue2=inline%3b+filename"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/product/20144/"
},
{
"trust": 0.1,
"url": "http://secunia.com/binary_analysis/sample_analysis/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/32259/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://www.linksys.com/servlet/satellite?c=l_download_c2\u0026childpagename=us%2flayout\u0026cid=1115417109974\u0026packedargs=sku%3d1152745215776\u0026pagename=linksys%2fcommon%2fvisitorwrapper"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-6230"
},
{
"db": "VULHUB",
"id": "VHN-34719"
},
{
"db": "BID",
"id": "56356"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004953"
},
{
"db": "PACKETSTORM",
"id": "70926"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-292"
},
{
"db": "NVD",
"id": "CVE-2008-4594"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2012-6230"
},
{
"db": "VULHUB",
"id": "VHN-34719"
},
{
"db": "BID",
"id": "56356"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-004953"
},
{
"db": "PACKETSTORM",
"id": "70926"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-292"
},
{
"db": "NVD",
"id": "CVE-2008-4594"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-11-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-6230"
},
{
"date": "2008-10-17T00:00:00",
"db": "VULHUB",
"id": "VHN-34719"
},
{
"date": "2008-10-17T00:00:00",
"db": "BID",
"id": "56356"
},
{
"date": "2012-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-004953"
},
{
"date": "2008-10-15T06:24:30",
"db": "PACKETSTORM",
"id": "70926"
},
{
"date": "2008-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200810-292"
},
{
"date": "2008-10-17T20:33:56.067000",
"db": "NVD",
"id": "CVE-2008-4594"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-11-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-6230"
},
{
"date": "2017-08-08T00:00:00",
"db": "VULHUB",
"id": "VHN-34719"
},
{
"date": "2008-10-17T00:00:00",
"db": "BID",
"id": "56356"
},
{
"date": "2012-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-004953"
},
{
"date": "2008-10-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200810-292"
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2008-4594"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200810-292"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Linksys WAP4400N of SNMPv3 Component vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-004953"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200810-292"
}
],
"trust": 0.6
}
}
CVE-2008-4594 (GCVE-0-2008-4594)
Vulnerability from nvd – Published: 2008-10-17 20:00 – Updated: 2024-08-07 10:24- n/a
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T10:24:19.331Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "linksys-wap4400n-unspecified(45842)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45842"
},
{
"name": "ADV-2008-2805",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2805"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.linksys.com/servlet/Satellite?blobcol=urldata\u0026blobheadername1=Content-Type\u0026blobheadername2=Content-Disposition\u0026blobheadervalue1=application%2Fmsword\u0026blobheadervalue2=inline%3B+filename"
},
{
"name": "32259",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32259"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-09-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the SNMPv3 component in Linksys WAP4400N firmware 1.2.14 on the Marvell Semiconductor 88W8361P-BEM1 chipset has unknown impact and attack vectors, probably remote."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "linksys-wap4400n-unspecified(45842)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45842"
},
{
"name": "ADV-2008-2805",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2805"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.linksys.com/servlet/Satellite?blobcol=urldata\u0026blobheadername1=Content-Type\u0026blobheadername2=Content-Disposition\u0026blobheadervalue1=application%2Fmsword\u0026blobheadervalue2=inline%3B+filename"
},
{
"name": "32259",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32259"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-4594",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the SNMPv3 component in Linksys WAP4400N firmware 1.2.14 on the Marvell Semiconductor 88W8361P-BEM1 chipset has unknown impact and attack vectors, probably remote."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "linksys-wap4400n-unspecified(45842)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45842"
},
{
"name": "ADV-2008-2805",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2805"
},
{
"name": "http://www.linksys.com/servlet/Satellite?blobcol=urldata\u0026blobheadername1=Content-Type\u0026blobheadername2=Content-Disposition\u0026blobheadervalue1=application%2Fmsword\u0026blobheadervalue2=inline%3B+filename",
"refsource": "CONFIRM",
"url": "http://www.linksys.com/servlet/Satellite?blobcol=urldata\u0026blobheadername1=Content-Type\u0026blobheadername2=Content-Disposition\u0026blobheadervalue1=application%2Fmsword\u0026blobheadervalue2=inline%3B+filename"
},
{
"name": "32259",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32259"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-4594",
"datePublished": "2008-10-17T20:00:00",
"dateReserved": "2008-10-17T00:00:00",
"dateUpdated": "2024-08-07T10:24:19.331Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-4441 (GCVE-0-2008-4441)
Vulnerability from nvd – Published: 2008-10-14 15:00 – Updated: 2024-08-07 10:17- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T10:17:09.668Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-2805",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2805"
},
{
"name": "4400",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/4400"
},
{
"name": "20081013 Marvell Driver Malformed Association Request Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/497285/100/0/threaded"
},
{
"name": "32259",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32259"
},
{
"name": "linksys-wap4400n-request-dos(45841)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45841"
},
{
"name": "31742",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/31742"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-10-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Marvell driver for the Linksys WAP4400N Wi-Fi access point with firmware 1.2.14 on the Marvell 88W8361P-BEM1 chipset, when WEP mode is enabled, does not properly parse malformed 802.11 frames, which allows remote attackers to cause a denial of service (reboot or hang-up) via a malformed association request containing the WEP flag, as demonstrated by a request that is too short, a different vulnerability than CVE-2008-1144 and CVE-2008-1197."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2008-2805",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2805"
},
{
"name": "4400",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/4400"
},
{
"name": "20081013 Marvell Driver Malformed Association Request Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/497285/100/0/threaded"
},
{
"name": "32259",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32259"
},
{
"name": "linksys-wap4400n-request-dos(45841)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45841"
},
{
"name": "31742",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/31742"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-4441",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Marvell driver for the Linksys WAP4400N Wi-Fi access point with firmware 1.2.14 on the Marvell 88W8361P-BEM1 chipset, when WEP mode is enabled, does not properly parse malformed 802.11 frames, which allows remote attackers to cause a denial of service (reboot or hang-up) via a malformed association request containing the WEP flag, as demonstrated by a request that is too short, a different vulnerability than CVE-2008-1144 and CVE-2008-1197."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-2805",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2805"
},
{
"name": "4400",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4400"
},
{
"name": "20081013 Marvell Driver Malformed Association Request Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497285/100/0/threaded"
},
{
"name": "32259",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32259"
},
{
"name": "linksys-wap4400n-request-dos(45841)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45841"
},
{
"name": "31742",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31742"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-4441",
"datePublished": "2008-10-14T15:00:00",
"dateReserved": "2008-10-03T00:00:00",
"dateUpdated": "2024-08-07T10:17:09.668Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-4594 (GCVE-0-2008-4594)
Vulnerability from cvelistv5 – Published: 2008-10-17 20:00 – Updated: 2024-08-07 10:24- n/a
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T10:24:19.331Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "linksys-wap4400n-unspecified(45842)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45842"
},
{
"name": "ADV-2008-2805",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2805"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.linksys.com/servlet/Satellite?blobcol=urldata\u0026blobheadername1=Content-Type\u0026blobheadername2=Content-Disposition\u0026blobheadervalue1=application%2Fmsword\u0026blobheadervalue2=inline%3B+filename"
},
{
"name": "32259",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32259"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-09-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the SNMPv3 component in Linksys WAP4400N firmware 1.2.14 on the Marvell Semiconductor 88W8361P-BEM1 chipset has unknown impact and attack vectors, probably remote."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "linksys-wap4400n-unspecified(45842)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45842"
},
{
"name": "ADV-2008-2805",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2805"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.linksys.com/servlet/Satellite?blobcol=urldata\u0026blobheadername1=Content-Type\u0026blobheadername2=Content-Disposition\u0026blobheadervalue1=application%2Fmsword\u0026blobheadervalue2=inline%3B+filename"
},
{
"name": "32259",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32259"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-4594",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the SNMPv3 component in Linksys WAP4400N firmware 1.2.14 on the Marvell Semiconductor 88W8361P-BEM1 chipset has unknown impact and attack vectors, probably remote."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "linksys-wap4400n-unspecified(45842)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45842"
},
{
"name": "ADV-2008-2805",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2805"
},
{
"name": "http://www.linksys.com/servlet/Satellite?blobcol=urldata\u0026blobheadername1=Content-Type\u0026blobheadername2=Content-Disposition\u0026blobheadervalue1=application%2Fmsword\u0026blobheadervalue2=inline%3B+filename",
"refsource": "CONFIRM",
"url": "http://www.linksys.com/servlet/Satellite?blobcol=urldata\u0026blobheadername1=Content-Type\u0026blobheadername2=Content-Disposition\u0026blobheadervalue1=application%2Fmsword\u0026blobheadervalue2=inline%3B+filename"
},
{
"name": "32259",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32259"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-4594",
"datePublished": "2008-10-17T20:00:00",
"dateReserved": "2008-10-17T00:00:00",
"dateUpdated": "2024-08-07T10:24:19.331Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-4441 (GCVE-0-2008-4441)
Vulnerability from cvelistv5 – Published: 2008-10-14 15:00 – Updated: 2024-08-07 10:17- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T10:17:09.668Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-2805",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2805"
},
{
"name": "4400",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/4400"
},
{
"name": "20081013 Marvell Driver Malformed Association Request Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/497285/100/0/threaded"
},
{
"name": "32259",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32259"
},
{
"name": "linksys-wap4400n-request-dos(45841)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45841"
},
{
"name": "31742",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/31742"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-10-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Marvell driver for the Linksys WAP4400N Wi-Fi access point with firmware 1.2.14 on the Marvell 88W8361P-BEM1 chipset, when WEP mode is enabled, does not properly parse malformed 802.11 frames, which allows remote attackers to cause a denial of service (reboot or hang-up) via a malformed association request containing the WEP flag, as demonstrated by a request that is too short, a different vulnerability than CVE-2008-1144 and CVE-2008-1197."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2008-2805",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2805"
},
{
"name": "4400",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/4400"
},
{
"name": "20081013 Marvell Driver Malformed Association Request Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/497285/100/0/threaded"
},
{
"name": "32259",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32259"
},
{
"name": "linksys-wap4400n-request-dos(45841)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45841"
},
{
"name": "31742",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/31742"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-4441",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Marvell driver for the Linksys WAP4400N Wi-Fi access point with firmware 1.2.14 on the Marvell 88W8361P-BEM1 chipset, when WEP mode is enabled, does not properly parse malformed 802.11 frames, which allows remote attackers to cause a denial of service (reboot or hang-up) via a malformed association request containing the WEP flag, as demonstrated by a request that is too short, a different vulnerability than CVE-2008-1144 and CVE-2008-1197."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-2805",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2805"
},
{
"name": "4400",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4400"
},
{
"name": "20081013 Marvell Driver Malformed Association Request Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497285/100/0/threaded"
},
{
"name": "32259",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32259"
},
{
"name": "linksys-wap4400n-request-dos(45841)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45841"
},
{
"name": "31742",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31742"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-4441",
"datePublished": "2008-10-14T15:00:00",
"dateReserved": "2008-10-03T00:00:00",
"dateUpdated": "2024-08-07T10:17:09.668Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}