interesting:
http://www.racesimcentral.net/
news.html?s=articles/20021104/linksys_vulnera
Brian
http://www.racesimcentral.net/
news.html?s=articles/20021104/linksys_vulnera
Brian
http://smallbusiness.yahoo.com/business_technology/technology_news/so...
If you just keep remote management turned off, you're fine...
--
________________________
Todd Walker
http://twalker.d2g.com
________________________
Regards,
Uwe
--
mail replies to Uwe at schuerkamp dot de ( yahoo address is spambox)
Uwe Schuerkamp //////////////////////////// http://www.schuerkamp.de/
Herford, Germany \\\\\\\\\\\\\\\\\\\\\\\\\\ (52.0N/8.5E)
GPG Fingerprint: 2E 13 20 22 9A 3F 63 7F 67 6F E9 B1 A8 36 A4 61
SLG :-)
>> For those who use Linksys routers on home based LANs, this might be
>> interesting:
>http://smallbusiness.yahoo.com/business_technology/technology_news/so...
>> news.html?s=articles/20021104/linksys_vulnera
>> Brian
> There probably aren't many (and then there's social
> engineering), but it pays to have an easily patchable and /
> upgradable platform for this task with good support from the
> community, read: Linux, Net/OpenBSD, whatever.
> Regards,
> Uwe
> --
> mail replies to Uwe at schuerkamp dot de ( yahoo address is spambox)
> Uwe Schuerkamp //////////////////////////// http://www.schuerkamp.de/
> Herford, Germany \\\\\\\\\\\\\\\\\\\\\\\\\\ (52.0N/8.5E)
> GPG Fingerprint: 2E 13 20 22 9A 3F 63 7F 67 6F E9 B1 A8 36 A4 61
Mitch
http://smallbusiness.yahoo.com/business_technology/technology_news/so...
Couldn't resist.
Cheers,
Schumi
> There probably aren't many (and then there's social
> engineering), but it pays to have an easily patchable and /
> upgradable platform for this task with good support from the
> community, read: Linux, Net/OpenBSD, whatever.
> Regards,
> Uwe
> --
> mail replies to Uwe at schuerkamp dot de ( yahoo address is spambox)
> Uwe Schuerkamp //////////////////////////// http://www.schuerkamp.de/
> Herford, Germany \\\\\\\\\\\\\\\\\\\\\\\\\\ (52.0N/8.5E)
> GPG Fingerprint: 2E 13 20 22 9A 3F 63 7F 67 6F E9 B1 A8 36 A4 61
Todd
> > > Makes me wonder if any product is NOT at risk of being hacked.
> > There probably aren't many (and then there's social
> > engineering), but it pays to have an easily patchable and /
> > upgradable platform for this task with good support from the
> > community, read: Linux, Net/OpenBSD, whatever.
> > Regards,
> > Uwe
> > --
> > mail replies to Uwe at schuerkamp dot de ( yahoo address is spambox)
> > Uwe Schuerkamp //////////////////////////// http://www.schuerkamp.de/
> > Herford, Germany \\\\\\\\\\\\\\\\\\\\\\\\\\ (52.0N/8.5E)
> > GPG Fingerprint: 2E 13 20 22 9A 3F 63 7F 67 6F E9 B1 A8 36 A4 61
"To guard against this vulnerability, iDefense recommends upgrading the
router firmware to version 1.42.7 or later
(http://www.linksys.com/download/firmware.asp). That and subsequent firmware
versions appear to eliminate the vulnerability..."
> Todd
> > The Linksys is patchable and the problem is easily fixed, just a matter
of
> > proper settings. Same thing as leaving your doors unlocked.
> > > > Makes me wonder if any product is NOT at risk of being hacked.
> > > There probably aren't many (and then there's social
> > > engineering), but it pays to have an easily patchable and /
> > > upgradable platform for this task with good support from the
> > > community, read: Linux, Net/OpenBSD, whatever.
> > > Regards,
> > > Uwe
> > > --
> > > mail replies to Uwe at schuerkamp dot de ( yahoo address is spambox)
> > > Uwe Schuerkamp //////////////////////////// http://www.schuerkamp.de/
> > > Herford, Germany \\\\\\\\\\\\\\\\\\\\\\\\\\ (52.0N/8.5E)
> > > GPG Fingerprint: 2E 13 20 22 9A 3F 63 7F 67 6F E9 B1 A8 36 A4 61
> > > For those who use Linksys routers on home based LANs, this might be
> > > interesting:
The write up from iDefense is a bit more accurate:
"Additionally the iDEFENSE advisory, 10.31.02a: Denial of Service
Vulnerability in Linksys BEFSR41 EtherFast Cable/DSL Router, has been
udpated to reflect an official vendor response from Linksys. Also,
the analysis section has been refined to address some inaccuracies
from people reporting on this in the press.
http://www.idefense.com/advisory/10.31.02a.txt"
If you're using IE/OE6SP1 and not concerned about the 30+ known and
unpatched exploits, a little DoS is the least of your worries.
Relax, and don't believe everything you hear on the internet. lol
http://smallbusiness.yahoo.com/business_technology/technology_news/so...