ID

VAR-200303-0112


CVE

CVE-2003-0125


TITLE

Multitech RouteFinder Remote Memory Corruption Vulnerability

Trust: 0.9

sources: BID: 7067 // CNNVD: CNNVD-200303-050

DESCRIPTION

Buffer overflow in the web interface for SOHO Routefinder 550 before firmware 4.63 allows remote attackers to cause a denial of service (reboot) and execute arbitrary code via a long GET /OPTIONS value. A vulnerability has been discovered in Multitech RouteFinder 550 VPN firmware release 4.63 and earlier. The problem occurs due to insufficient bounds checking of data supplied in HTTP GET requests. By passing excessive data to the device it may be possible for a remote attacker to corrupt memory. Successful exploitation of this bug may result in a denial of service, causing the device to crash. Although it has not been confirmed, it may also be possible for an attacker to exploit this issue to execute arbitrary commands

Trust: 1.26

sources: NVD: CVE-2003-0125 // BID: 7067 // VULHUB: VHN-6955

AFFECTED PRODUCTS

vendor:multitechmodel:routefinder 550 vpnscope:lteversion:4.63

Trust: 1.0

vendor:multitechmodel:routefinder 550 vpnscope:eqversion:4.63

Trust: 0.6

vendor:multitechmodel:routefinder vpnscope:eqversion:550

Trust: 0.3

sources: BID: 7067 // CNNVD: CNNVD-200303-050 // NVD: CVE-2003-0125

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2003-0125
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200303-050
value: MEDIUM

Trust: 0.6

VULHUB: VHN-6955
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2003-0125
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-6955
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-6955 // CNNVD: CNNVD-200303-050 // NVD: CVE-2003-0125

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2003-0125

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200303-050

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200303-050

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-6955

EXTERNAL IDS

db:BIDid:7067

Trust: 2.0

db:NVDid:CVE-2003-0125

Trust: 1.7

db:CNNVDid:CNNVD-200303-050

Trust: 0.7

db:XFid:11514

Trust: 0.6

db:EXPLOIT-DBid:22345

Trust: 0.1

db:SEEBUGid:SSVID-76150

Trust: 0.1

db:VULHUBid:VHN-6955

Trust: 0.1

sources: VULHUB: VHN-6955 // BID: 7067 // CNNVD: CNNVD-200303-050 // NVD: CVE-2003-0125

REFERENCES

url:http://www.securityfocus.com/bid/7067

Trust: 1.7

url:ftp://ftp.multitech.com/routers/rf550vpn.txt

Trust: 1.7

url:http://www.krusesecurity.dk/advisories/routefind550bof.txt

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/11514

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/11514

Trust: 0.6

url:http://www.multitech.com/support/soho_vpn/firmware.asp

Trust: 0.3

url:/archive/1/314726

Trust: 0.3

url: -

Trust: 0.1

sources: VULHUB: VHN-6955 // BID: 7067 // CNNVD: CNNVD-200303-050 // NVD: CVE-2003-0125

CREDITS

The discovery of this vulnerability has been credited to "Peter Kruse" <kruse@krusesecurity.dk>.

Trust: 0.9

sources: BID: 7067 // CNNVD: CNNVD-200303-050

SOURCES

db:VULHUBid:VHN-6955
db:BIDid:7067
db:CNNVDid:CNNVD-200303-050
db:NVDid:CVE-2003-0125

LAST UPDATE DATE

2024-08-14T14:53:52.030000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-6955date:2018-05-03T00:00:00
db:BIDid:7067date:2003-03-11T00:00:00
db:CNNVDid:CNNVD-200303-050date:2005-05-13T00:00:00
db:NVDid:CVE-2003-0125date:2018-05-03T01:29:19.333

SOURCES RELEASE DATE

db:VULHUBid:VHN-6955date:2003-03-18T00:00:00
db:BIDid:7067date:2003-03-11T00:00:00
db:CNNVDid:CNNVD-200303-050date:2003-03-18T00:00:00
db:NVDid:CVE-2003-0125date:2003-03-18T05:00:00