[11302] in bugtraq

home help back first fref pref prev next nref lref last post

Re: FlowPoint DSL router vulnerability

daemon@ATHENA.MIT.EDU (Chris Shenton)
Sat Aug 7 01:21:33 1999

Mime-Version: 1.0 (generated by SEMI 1.13.3 - "Komaiko")
Content-Type: text/plain; charset=US-ASCII
Message-Id:  <lfaes53rmm.fsf@Samizdat.uucom.com>
Date:         Fri, 6 Aug 1999 10:34:09 -0400
Reply-To: Chris Shenton <cshenton@UUCOM.COM>
From: Chris Shenton <cshenton@UUCOM.COM>
X-To:         Matt <matt@USE.NET>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  Matt's message of "Thu, 5 Aug 1999 14:09:09 -0700"

On Thu, 5 Aug 1999 14:09:09 -0700, Matt <matt@USE.NET> said:

Matt> The following URL contains information about a firmware upgrade
Matt> for FlowPoint DSL routers that fixes a possible "security
Matt> compromise".  FlowPoint has chosen not to release ANY
Matt> information whatsoever about the vulnerability. I was curious if
Matt> anyone had any more information about this vulnerability than
Matt> what FlowPoint is divulging.

Matt> http://www.flowpoint.com/support/techbulletin/sec308.htm

I found a vulnerability in the 3.0.2 code with one common scanning
tools. They shipped me a fixed kernel in under an hour. I was
impressed.

home help back first fref pref prev next nref lref last post