VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : 脆弱性脅威分析用情報の定型データ配信
[ about VRDA Feed | JPCERT/CC



 
分析対象脆弱性情報 (リビジョン番号 : 1) [ Download XML
CVE-2014-9583
wrt_firmware: common.c in infosvr in ASUS WRT firmware 3.0.0.4.37...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9583

原文

common.c in infosvr in ASUS WRT firmware 3.0.0.4.376_1071, 3.0.0.376.2524-g0013f52, and other versions, as used in RT-AC66U, RT-N66U, and other routers, does not properly check the MAC address for a request, which allows remote attackers to bypass authentication and execute arbitrary commands via a NET_CMD_ID_MANU_CMD packet to UDP port 9999. NOTE: this issue was incorrectly mapped to CVE-2014-10000, but that ID is invalid due to its use as an example of the 2014 CVE ID syntax change.




この情報について
分析情報提供元:
NIST NVD
初版公開日:
2015-01-08
分析対象脆弱性情報の分類:
アドバイザリ・注意喚起
最終更新日:
2015-01-09




脆弱性の影響を受ける製品の識別子
 


脆弱性の分析内容
[攻撃元区分]  [?]
未評価 [?]

ローカル [?]
隣接 [?]
X ネットワーク [?]

[攻撃条件の複雑さ]  [?]
未評価 [?]

 [?]
 [?]
X [?]

[攻撃前の認証要否]  [?]
未評価 [?]

複数 [?]
単一 [?]
X 不要 [?]

[機密性への影響]  [?]
未評価 [?]

影響なし [?]
部分的 [?]
X 全面的 [?]

[完全性への影響]  [?]
未評価 [?]

影響なし [?]
部分的 [?]
X 全面的 [?]

[可用性への影響]  [?]
未評価 [?]

影響なし [?]
部分的 [?]
X 全面的 [?]

関連情報




参考情報
Vulnerability Type Permissions, Privileges, and Access Control (CWE-264)





Copyright © 2015 JPCERT/CC All Rights Reserved.