CVE-2003-1250

Efficient Networks 5861 DSL router, when running firmware 5.3.80 configured to block incoming TCP SYN, packets allows remote attackers to cause a denial of service (crash) via a flood of TCP SYN packets to the WAN interface using a port scanner such as nmap.
Configurations

Configuration 1 (hide)

cpe:2.3:h:efficient_networks:5861_dsl_router:5.3.80_firmware:*:*:*:*:*:*:*

History

20 Nov 2024, 23:46

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0015.html - Vendor Advisory () http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0015.html - Vendor Advisory
References () http://securitytracker.com/id?1005980 - () http://securitytracker.com/id?1005980 -
References () http://www.iss.net/security_center/static/11032.php - () http://www.iss.net/security_center/static/11032.php -
References () http://www.securityfocus.com/archive/1/306081 - Vendor Advisory () http://www.securityfocus.com/archive/1/306081 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/308008 - () http://www.securityfocus.com/archive/1/308008 -
References () http://www.securityfocus.com/bid/6573 - () http://www.securityfocus.com/bid/6573 -
References () http://www.securitytracker.com/id?1005910 - () http://www.securitytracker.com/id?1005910 -

Information

Published : 2003-12-31 05:00

Updated : 2024-11-20 23:46


NVD link : CVE-2003-1250

Mitre link : CVE-2003-1250

CVE.ORG link : CVE-2003-1250


JSON object : View

Products Affected

efficient_networks

  • 5861_dsl_router