ID
VAR-E-201012-0906
CVE
cve_id: | CVE-2009-2189 | Trust: 0.3 |
TITLE
Apple Time Capsule and AirPort Base Station (CVE-2009-2189) Remote Denial of Service Vulnerability
Trust: 0.3
DESCRIPTION
Apple Time Capsule and AirPort Base Station are prone to a remote denial-of-service vulnerability when handling an overly large quantity of Router Advertisement (RA) and Neighbor Discovery (ND) packets.
An attacker can exploit this issue to cause an affected device to restart, triggering a denial-of-service condition for legitimate users.
Apple Time Capsule and AirPort Base Station running firmware versions prior to 7.5.2 are affected.
NOTE: This issue was previously discussed in BID 45466 (Apple Time Capsule and AirPort Base Station Multiple Remote Vulnerabilities) but has been given its own record to better document it.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.5 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.4.2 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.4.1 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.4.2 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.3.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.2.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.7 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.5 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.5 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | apple | model: | airport extreme base station with 802.11n | scope: | eq | version: | 7.4.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme base station | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.4.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.0.4 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.0.3 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.4+ | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | airport express base station with 802.11n | scope: | eq | version: | 7.4.1 | Trust: 0.3 |
vendor: | apple | model: | airport express | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | ne | version: | 7.5.2 | Trust: 0.3 |
vendor: | apple | model: | airport extreme base station with 802.11n | scope: | ne | version: | 7.5.2 | Trust: 0.3 |
vendor: | apple | model: | airport express base station with 802.11n | scope: | ne | version: | 7.5.2 | Trust: 0.3 |
EXPLOIT
An attacker can exploit this issue with readily available network utilities.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Unknown
Trust: 0.3
CREDITS
Shoichi Sakane of the KAME project, Kanai Akira of Internet Multifeed Co., Shirahata Shin and Rodney Van Meter of Keio University, and Tatuya Jinmei of Internet Systems Consortium, Inc.
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2009-2189 | Trust: 0.3 |
db: | BID | id: | 45490 | Trust: 0.3 |
REFERENCES
url: | http://software.cisco.com/download/navigator.html?mdfid=283613663 | Trust: 0.3 |
SOURCES
db: | BID | id: | 45490 |
LAST UPDATE DATE
2022-07-27T09:35:55.198000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 45490 | date: | 2010-12-16T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 45490 | date: | 2010-12-16T00:00:00 |