Vulnerability Description
Linksys WRT54G routers version 5 (running VXWorks) allow remote attackers to cause a denial of service by sending a malformed DCC SEND string to an IRC channel, which causes an IRC connection reset, possibly related to the masquerading code for NAT environments, and as demonstrated via (1) a DCC SEND with a single long argument, or (2) a DCC SEND with IP, port, and filesize arguments with a 0 value.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linksys | Wrt54G V5 | All versions |
References
- http://www.hm2k.org/news/1141413208.html
- http://www.securityfocus.com/archive/1/426756/100/0/threaded
- http://www.securityfocus.com/archive/1/426761/100/0/threaded
- http://www.securityfocus.com/archive/1/426863/100/0/threaded
- http://www.securityfocus.com/archive/1/426934/100/0/threaded
- http://www.securityfocus.com/bid/16954
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25230
- http://www.hm2k.org/news/1141413208.html
- http://www.securityfocus.com/archive/1/426756/100/0/threaded
- http://www.securityfocus.com/archive/1/426761/100/0/threaded
- http://www.securityfocus.com/archive/1/426863/100/0/threaded
- http://www.securityfocus.com/archive/1/426934/100/0/threaded
- http://www.securityfocus.com/bid/16954
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25230
FAQ
What is CVE-2006-1067?
CVE-2006-1067 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Linksys WRT54G routers version 5 (running VXWorks) allow remote attackers to cause a denial of service by sending a malformed DCC SEND string to an IRC channel, which causes an IRC connection reset, p...
How severe is CVE-2006-1067?
CVE-2006-1067 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1067?
Check the references section above for vendor advisories and patch information. Affected products include: Linksys Wrt54G V5.