3com OfficeConnect Remote 812 ADSL Router 1.1.9.4 denial of service
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.3 | $0-$5k | 0.00 |
Summary
A vulnerability classified as critical was found in 3com OfficeConnect Remote 812 ADSL Router 1.1.9.4. Affected by this issue is some unknown functionality. The manipulation results in denial of service. This vulnerability is reported as CVE-2004-0476. The attack can be launched remotely. No exploit exists. Applying restrictive firewalling is recommended.
Details
A vulnerability was found in 3com OfficeConnect Remote 812 ADSL Router 1.1.9.4 (Router Operating System). It has been classified as critical. Affected is an unknown function. The manipulation with an unknown input leads to a denial of service vulnerability. CWE is classifying the issue as CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. This is going to have an impact on availability. CVE summarizes:
Buffer overflow in 3Com OfficeConnect Remote 812 ADSL Router 1.1.9.4 allows remote attackers to cause a denial of service (reboot or packet loss) via a long string containing Telnet escape characters to the Telnet port.
The bug was discovered 05/24/2004. The weakness was disclosed 05/26/2004 by Rafel Ivgi (The Insider) with iDEFENSE (Website). The advisory is shared for download at idefense.com. This vulnerability is traded as CVE-2004-0476 since 05/17/2004. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1499.
The vulnerability was handled as a non-public zero-day exploit for at least 2 days. During that time the estimated underground price was around $0-$5k.
Upgrading to version 23 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at support.3com.com.It is possible to mitigate the weakness by firewalling . The best possible mitigation is suggested to be applying a restrictive firewalling.
The vulnerability is also documented in the databases at X-Force (16257), SecurityFocus (BID 10419†), OSVDB (6424†) and Secunia (SA11716†). Further details are available at heise.de. The entry VDB-676 is pretty similar. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: http://www.3com.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 7.3
VulDB Base Score: 7.5
VulDB Temp Score: 7.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: FirewallStatus: 🔍
0-Day Time: 🔍
Upgrade: OfficeConnect Remote 812 ADSL Router 23
Patch: support.3com.com
Timeline
05/17/2004 🔍05/24/2004 🔍
05/26/2004 🔍
05/26/2004 🔍
05/26/2004 🔍
06/01/2004 🔍
08/18/2004 🔍
06/28/2019 🔍
Sources
Vendor: 3com.comAdvisory: idefense.com⛔
Researcher: Rafel Ivgi (The Insider)
Organization: iDEFENSE
Status: Not defined
CVE: CVE-2004-0476 (🔍)
GCVE (CVE): GCVE-0-2004-0476
GCVE (VulDB): GCVE-100-672
X-Force: 16257 - 3Com OfficeConnect Telnet escape sequence buffer overflow, Low Risk
SecurityFocus: 10419 - 3Com OfficeConnect Remote 812 ADSL Router Telnet Buffer Overflow Vulnerability
Secunia: 11716 - 3Com OfficeConnect 812 ADSL Router Multiple Vulnerabilities, Moderately Critical
OSVDB: 6424 - 3Com OfficeConnect 812 ADSL Router Telnet Protocol DoS
SecuriTeam: securiteam.com
Misc.: 🔍
See also: 🔍
Entry
Created: 06/01/2004 12:03Updated: 06/28/2019 14:22
Changes: 06/01/2004 12:03 (78), 06/28/2019 14:22 (2)
Complete: 🔍
Cache ID: 216:E8F:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.