Show plain JSON{"id": "CVE-2004-0580", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2004-08-06T04:00:00.000", "references": [{"url": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832&p_%20%5Ccreated=1086294093&p_sid=pU1X1idh&p_lva=&p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20%5CJnBfcm93X2NudD02NTQmcF9wYWdlPTE%2A&p_li=", "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=108662876129301&w=2", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/11606", "source": "cve@mitre.org"}, {"url": "http://securitytracker.com/alerts/2004/May/1010288.html", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/6325", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/10329", "tags": ["Exploit", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16142", "source": "cve@mitre.org"}, {"url": "http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832&p_%20%5Ccreated=1086294093&p_sid=pU1X1idh&p_lva=&p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20%5CJnBfcm93X2NudD02NTQmcF9wYWdlPTE%2A&p_li=", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://marc.info/?l=bugtraq&m=108662876129301&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/11606", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securitytracker.com/alerts/2004/May/1010288.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/6325", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/10329", "tags": ["Exploit", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16142", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information."}, {"lang": "es", "value": "DHCP en los encaminadores de cable y ADSL Linksys BEFSR11, BEFSR41, BEFSR81 y BEFSRU31, con versi\u00f3n de firmware 1.45.7, no limpia adecuadamente b\u00faferes usados anteriormente en un paquete de respueta BOOTP, lo que permite a atacantes remotos obtener informaci\u00f3n sensible."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:linksys:befcmu10:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90DA95A3-DF00-411F-8582-60CB737BA116"}, {"criteria": "cpe:2.3:h:linksys:befn2ps4:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C888358-9CF4-4D5B-AAC0-7E606978C00E"}, {"criteria": "cpe:2.3:h:linksys:befn2ps4:1.42.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3FFAA33-12EC-40E4-9A34-DDB95A77A63C"}, {"criteria": "cpe:2.3:h:linksys:befsr11:1.40.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC087D32-60A2-48AD-8DD3-1088C641F880"}, {"criteria": "cpe:2.3:h:linksys:befsr11:1.41:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A2B43B5-0083-4F71-BD69-9EA4C0AE1ACB"}, {"criteria": "cpe:2.3:h:linksys:befsr11:1.42.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F69304C-DC53-4782-AEE0-E575B44FF56D"}, {"criteria": "cpe:2.3:h:linksys:befsr11:1.42.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7F5E5AA-6469-4405-BDE9-AD4D174A1A6F"}, {"criteria": "cpe:2.3:h:linksys:befsr11:1.43:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EA4C23A-598A-4B11-BD78-39EA55E0E6A4"}, {"criteria": "cpe:2.3:h:linksys:befsr11:1.43.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26EE9DDF-2DCD-4432-A513-84AE9BCE94C2"}, {"criteria": "cpe:2.3:h:linksys:befsr11:1.44:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2A867E8-F2ED-4772-BB5A-C50FFBA1B448"}, {"criteria": "cpe:2.3:h:linksys:befsr41:1.35:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A52F18C5-6D00-493C-B38F-D6695670357F"}, {"criteria": "cpe:2.3:h:linksys:befsr41:1.36:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F7E417D-3751-4FCF-AECC-7601F77198E9"}, {"criteria": "cpe:2.3:h:linksys:befsr41:1.37:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "127E79AF-33BE-485E-B4A3-058ECC898E9F"}, {"criteria": "cpe:2.3:h:linksys:befsr41:1.38.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B49FC600-D1E3-4233-AC8A-DBFA87D2138D"}, {"criteria": "cpe:2.3:h:linksys:befsr41:1.39:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0754C5C-166A-4084-A4A5-510AAC1AC6FE"}, {"criteria": "cpe:2.3:h:linksys:befsr41:1.40.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "858C8B66-8FF4-4A1E-9B2D-363AC169467E"}, {"criteria": "cpe:2.3:h:linksys:befsr41:1.41:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "048E48C6-6A62-4E64-A69C-0F7B872AA121"}, {"criteria": "cpe:2.3:h:linksys:befsr41:1.42.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0FAD3B2-69ED-451F-9CD2-6B552E962B7C"}, {"criteria": "cpe:2.3:h:linksys:befsr41:1.42.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "525E00CA-DEEA-410F-A90C-C73C8D304E36"}, {"criteria": "cpe:2.3:h:linksys:befsr41:1.43:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6337002A-EA1A-47A9-B4A5-E3EECD859C41"}, {"criteria": "cpe:2.3:h:linksys:befsr41:1.43.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E88F34EA-AFCF-4CED-A7A4-9C76309E90E9"}, {"criteria": "cpe:2.3:h:linksys:befsr41:1.44:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5219F89-4CB8-4239-A7C2-1E869E931777"}, {"criteria": "cpe:2.3:h:linksys:befsr41:1.45.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEC6E599-5026-4580-B94F-6DD33E0952DF"}, {"criteria": "cpe:2.3:h:linksys:befsr41w:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FC1F57E-2E8F-419C-8725-18208B8C1874"}, {"criteria": "cpe:2.3:h:linksys:befsr81:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF867F97-F14F-4056-B0C8-A72E2FE2E74D"}, {"criteria": "cpe:2.3:h:linksys:befsr81:2.42.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC5B40A4-E7CA-4BDD-899E-3693129D347E"}, {"criteria": "cpe:2.3:h:linksys:befsr81:2.44:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7142F135-C45C-4737-BDBB-1CCF2A1827EC"}, {"criteria": "cpe:2.3:h:linksys:befsru31:1.40.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "914AC3F4-064A-47A6-B707-00FCC0607761"}, {"criteria": "cpe:2.3:h:linksys:befsru31:1.41:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44405B42-D7AD-42E3-BD17-A619936DC02D"}, {"criteria": "cpe:2.3:h:linksys:befsru31:1.42.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9209ABC6-7DAA-46CE-8F59-2F9430FF2491"}, {"criteria": "cpe:2.3:h:linksys:befsru31:1.42.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "958AF49D-FB97-476F-B8DF-5A760F72DBC6"}, {"criteria": "cpe:2.3:h:linksys:befsru31:1.43:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E80E4BFD-DB4D-4574-A0F6-15881A66F308"}, {"criteria": "cpe:2.3:h:linksys:befsru31:1.43.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67CC8982-FF47-45CF-8861-AD2F5A8D0E0A"}, {"criteria": "cpe:2.3:h:linksys:befsru31:1.44:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "892159A1-620C-413A-ADE5-205B12E5E080"}, {"criteria": "cpe:2.3:h:linksys:befsx41:1.42.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6353EE40-1C83-4A1A-836F-6716D95A5A88"}, {"criteria": "cpe:2.3:h:linksys:befsx41:1.43:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2704FB57-AC43-4C92-B038-8C226C8A47B6"}, {"criteria": "cpe:2.3:h:linksys:befsx41:1.43.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDD7A706-C379-4D56-97CA-88D3F76D4EF3"}, {"criteria": "cpe:2.3:h:linksys:befsx41:1.43.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D0F2944-C902-4652-85FA-9223773D53DC"}, {"criteria": "cpe:2.3:h:linksys:befsx41:1.44:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90E9B1CD-FFC1-4318-BB31-6753DEF73D5A"}, {"criteria": "cpe:2.3:h:linksys:befsx41:1.44.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6EFD70A-34B4-4F27-9377-A665505895D2"}, {"criteria": "cpe:2.3:h:linksys:befsx41:1.45.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B23D8CA-A966-4E23-B6D2-4E7AAD239543"}, {"criteria": "cpe:2.3:h:linksys:befvp41:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A513272D-E013-498F-8582-0645DB3366F1"}, {"criteria": "cpe:2.3:h:linksys:befvp41:1.39.64:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0ADD86DE-4495-4C95-9C32-294442915A85"}, {"criteria": "cpe:2.3:h:linksys:befvp41:1.40.3f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFB5F870-AE5C-4B0E-AEEA-335A990E6EA3"}, {"criteria": "cpe:2.3:h:linksys:befvp41:1.40.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C359F33C-D4B0-4C22-8CEE-86F6FE8A1987"}, {"criteria": "cpe:2.3:h:linksys:befvp41:1.42.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56484A79-0B44-439F-A64B-B55660E0C7FB"}, {"criteria": "cpe:2.3:h:linksys:rv082:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88647EC9-AD63-4643-B1B9-C0C224E6F93B"}, {"criteria": "cpe:2.3:h:linksys:wap55ag:1.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "935294D7-41A5-4E47-A168-A908E61CADCD"}, {"criteria": "cpe:2.3:h:linksys:wrt54g:1.42.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51DC73D9-CBB8-4683-BB21-3AA0F9468F18"}, {"criteria": "cpe:2.3:h:linksys:wrt54g:2.00.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AF3AB9D-CE52-42CF-9FD7-ECB83495C3AE"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}