[35051] in bugtraq
Re: [Full-Disclosure] iDEFENSE Security Advisory 05.27.04: 3Com OfficeConnect Remote 812 ADSL Router Authentication Bypass Vulnerability
daemon@ATHENA.MIT.EDU (Seth Alan Woolley)
Fri May 28 13:45:41 2004
Date: Thu, 27 May 2004 11:26:06 -0700
From: Seth Alan Woolley <seth@tautology.org>
To: customerservice@idefense.com
Cc: full-disclosure@lists.netsys.com, bugtraq@securityfocus.com
Message-ID: <20040527182606.GA9628@positivism.org>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="LQksG6bCIzRHxTLp"
Content-Disposition: inline
In-Reply-To: <FB24803D1DF2A34FA59FC157B77C9705028DD191@idserv04.idef.com>
--LQksG6bCIzRHxTLp
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Thu, May 27, 2004 at 12:37:51PM -0400, idlabs-advisories@idefense.com wr=
ote:
> 3Com OfficeConnect Remote 812 ADSL Router Authentication Bypass
> Vulnerability
>=20
> iDEFENSE Security Advisory 05.27.04
> www.idefense.com/application/poi/display?id=3D106&type=3Dvulnerabilities
> May 27, 2004
>=20
<snip>
Does this issue also affect every other device using the Allegro RomPager/2=
.10 firmware?
If so, it affects /much/ more than the 3Com 812.
cf:
http://www.securityfocus.com/archive/1/62960
http://lists.netsys.com/pipermail/full-disclosure/2004-May/021828.html
Seth
--=20
Seth Alan Woolley [seth at positivism.org], SPAM/UCE is unauthorized
Key id EF10E21A =3D 36AD 8A92 8499 8439 E6A8 3724 D437 AF5D EF10 E21A
http://smgl.positivism.org:11371/pks/lookup?op=3Dget&search=3D0xEF10E21A
Security Team Leader Source Mage GNU/Linux http://www.sourcemage.org
--LQksG6bCIzRHxTLp
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFAtjK+1DevXe8Q4hoRAq4RAJ0Yt66LuT+YcmutaHAvwFxpUBVbOgCfaAk6
XhvaeW16dRp5hjP/c+dbM7E=
=DpMs
-----END PGP SIGNATURE-----
--LQksG6bCIzRHxTLp--