ID
VAR-E-201012-0534
CVE
cve_id: | CVE-2010-1804 | Trust: 0.3 |
TITLE
Apple Time Capsule and AirPort Base Station DHCP Reply Remote Denial of Service Vulnerability
Trust: 0.3
DESCRIPTION
Apple Time Capsule and AirPort Base Station are prone to a remote denial-of-service vulnerability because of an implementation issue in the network bridge.
An attacker can exploit this issue to cause an affected device to stop responding to the network traffic, triggering a denial-of-service condition for legitimate users.
Apple Time Capsule and AirPort Base Station running firmware versions prior to 7.5.2 are affected.
NOTE: This issue was previously discussed in BID 45466 (Apple Time Capsule and AirPort Base Station Multiple Remote Vulnerabilities) but has been given its own record to better document it.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.5 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.4.2 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.4.1 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.4.2 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.3.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.2.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.7 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.5 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.5 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | apple | model: | airport extreme base station with 802.11n | scope: | eq | version: | 7.4.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme base station | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.4.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.0.4 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.0.3 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.4+ | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | airport express base station with 802.11n | scope: | eq | version: | 7.4.1 | Trust: 0.3 |
vendor: | apple | model: | airport express | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | ne | version: | 7.5.2 | Trust: 0.3 |
vendor: | apple | model: | airport extreme base station with 802.11n | scope: | ne | version: | 7.5.2 | Trust: 0.3 |
vendor: | apple | model: | airport express base station with 802.11n | scope: | ne | version: | 7.5.2 | Trust: 0.3 |
EXPLOIT
An attacker can exploit this issue with readily available network utilities.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Unknown
Trust: 0.3
CREDITS
Stefan R. Filipek.
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2010-1804 | Trust: 0.3 |
db: | BID | id: | 45491 | Trust: 0.3 |
REFERENCES
url: | http://software.cisco.com/download/navigator.html?mdfid=283613663 | Trust: 0.3 |
SOURCES
db: | BID | id: | 45491 |
LAST UPDATE DATE
2022-07-27T09:12:34.801000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 45491 | date: | 2010-12-16T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 45491 | date: | 2010-12-16T00:00:00 |