Efficient Networks 5861 DSL router, when running firmware 5.3.80 configured to block incoming TCP SYN, packets allows remote attackers to cause a denial of service (crash) via a flood of TCP SYN packets to the WAN interface using a port scanner such as nmap.
References
Configurations
History
20 Nov 2024, 23:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0015.html - Vendor Advisory | |
References | () http://securitytracker.com/id?1005980 - | |
References | () http://www.iss.net/security_center/static/11032.php - | |
References | () http://www.securityfocus.com/archive/1/306081 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/308008 - | |
References | () http://www.securityfocus.com/bid/6573 - | |
References | () http://www.securitytracker.com/id?1005910 - |
Information
Published : 2003-12-31 05:00
Updated : 2024-11-20 23:46
NVD link : CVE-2003-1250
Mitre link : CVE-2003-1250
CVE.ORG link : CVE-2003-1250
JSON object : View
Products Affected
efficient_networks
- 5861_dsl_router
CWE