ID

VAR-200802-0399


CVE

CVE-2008-0680


TITLE

MicroTik RouterOS of SNMPd Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2008-004051

DESCRIPTION

SNMPd in MikroTik RouterOS 3.2 and earlier allows remote attackers to cause a denial of service (daemon crash) via a crafted SNMP SET request. MikroTik RouterOS is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash an affected router, denying service to legitimate users. This issue affects versions up to and including RouterOS 3.2. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: RouterOS SNMPd "SNMP SET" Denial of Service Vulnerability SECUNIA ADVISORY ID: SA28762 VERIFY ADVISORY: http://secunia.com/advisories/28762/ CRITICAL: Less critical IMPACT: DoS WHERE: >From local network OPERATING SYSTEM: RouterOS 3.x http://secunia.com/product/17436/ DESCRIPTION: ShadOS has reported a vulnerability in RouterOS, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the processing of SNMP requests received by the SNMPd server. The vulnerability is reported in version 3.2. SOLUTION: Restrict access to trusted users only. PROVIDED AND/OR DISCOVERED BY: ShadOS ORIGINAL ADVISORY: http://milw0rm.com/exploits/5054 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2008-0680 // JVNDB: JVNDB-2008-004051 // BID: 27599 // VULHUB: VHN-30805 // VULMON: CVE-2008-0680 // PACKETSTORM: 63251

AFFECTED PRODUCTS

vendor:microtikmodel:routerosscope:lteversion:3.2

Trust: 1.8

vendor:microtikmodel:routerosscope:eqversion:3.2

Trust: 0.6

vendor:mikrotikmodel:routerosscope:eqversion:3.2

Trust: 0.3

sources: BID: 27599 // JVNDB: JVNDB-2008-004051 // CNNVD: CNNVD-200802-181 // NVD: CVE-2008-0680

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0680
value: HIGH

Trust: 1.0

NVD: CVE-2008-0680
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200802-181
value: HIGH

Trust: 0.6

VULHUB: VHN-30805
value: HIGH

Trust: 0.1

VULMON: CVE-2008-0680
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-0680
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-30805
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-30805 // VULMON: CVE-2008-0680 // JVNDB: JVNDB-2008-004051 // CNNVD: CNNVD-200802-181 // NVD: CVE-2008-0680

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2008-004051 // NVD: CVE-2008-0680

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200802-181

TYPE

design error

Trust: 0.6

sources: CNNVD: CNNVD-200802-181

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-004051

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-30805 // VULMON: CVE-2008-0680

PATCH

title:Top Pageurl:http://www.mikrotik.com/software.html

Trust: 0.8

sources: JVNDB: JVNDB-2008-004051

EXTERNAL IDS

db:NVDid:CVE-2008-0680

Trust: 2.9

db:BIDid:27599

Trust: 2.1

db:SECUNIAid:28762

Trust: 2.0

db:EXPLOIT-DBid:5054

Trust: 1.9

db:VUPENid:ADV-2008-0399

Trust: 1.8

db:JVNDBid:JVNDB-2008-004051

Trust: 0.8

db:CNNVDid:CNNVD-200802-181

Trust: 0.7

db:MILW0RMid:5054

Trust: 0.6

db:SEEBUGid:SSVID-65171

Trust: 0.1

db:VULHUBid:VHN-30805

Trust: 0.1

db:VULMONid:CVE-2008-0680

Trust: 0.1

db:PACKETSTORMid:63251

Trust: 0.1

sources: VULHUB: VHN-30805 // VULMON: CVE-2008-0680 // BID: 27599 // JVNDB: JVNDB-2008-004051 // PACKETSTORM: 63251 // CNNVD: CNNVD-200802-181 // NVD: CVE-2008-0680

REFERENCES

url:http://www.securityfocus.com/bid/27599

Trust: 1.9

url:http://hellknights.void.ru/shados/snmp_sploit.c

Trust: 1.8

url:http://secunia.com/advisories/28762

Trust: 1.8

url:https://www.exploit-db.com/exploits/5054

Trust: 1.2

url:http://www.vupen.com/english/advisories/2008/0399

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0680

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0680

Trust: 0.8

url:http://www.milw0rm.com/exploits/5054

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/0399

Trust: 0.6

url:http://www.mikrotik.com/software.html

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/5054/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/17436/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://milw0rm.com/exploits/5054

Trust: 0.1

url:http://secunia.com/advisories/28762/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-30805 // VULMON: CVE-2008-0680 // BID: 27599 // JVNDB: JVNDB-2008-004051 // PACKETSTORM: 63251 // CNNVD: CNNVD-200802-181 // NVD: CVE-2008-0680

CREDITS

ShadOS is credited with discovering this vulnerability.

Trust: 0.3

sources: BID: 27599

SOURCES

db:VULHUBid:VHN-30805
db:VULMONid:CVE-2008-0680
db:BIDid:27599
db:JVNDBid:JVNDB-2008-004051
db:PACKETSTORMid:63251
db:CNNVDid:CNNVD-200802-181
db:NVDid:CVE-2008-0680

LAST UPDATE DATE

2024-11-23T22:39:42.913000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-30805date:2017-10-04T00:00:00
db:VULMONid:CVE-2008-0680date:2017-10-04T00:00:00
db:BIDid:27599date:2015-05-07T17:33:00
db:JVNDBid:JVNDB-2008-004051date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200802-181date:2008-09-05T00:00:00
db:NVDid:CVE-2008-0680date:2024-11-21T00:42:39.917

SOURCES RELEASE DATE

db:VULHUBid:VHN-30805date:2008-02-12T00:00:00
db:VULMONid:CVE-2008-0680date:2008-02-12T00:00:00
db:BIDid:27599date:2008-02-04T00:00:00
db:JVNDBid:JVNDB-2008-004051date:2012-09-25T00:00:00
db:PACKETSTORMid:63251date:2008-02-05T00:19:12
db:CNNVDid:CNNVD-200802-181date:2008-02-11T00:00:00
db:NVDid:CVE-2008-0680date:2008-02-12T01:00:00