33 lines
No EOL
1 KiB
Text
33 lines
No EOL
1 KiB
Text
Name: ZyXEL ZyWALL Quagga/Zebra Remote Root Vulnerability
|
||
Release Date: 10 March 2008
|
||
Discover: Pranav Joshi <joshipranav@gmail.com>
|
||
Vendor: ZyXEL
|
||
Products Affected: ZyWALL
|
||
|
||
(Status on other affected products & firmwares pending from vendor’s end)
|
||
|
||
CVE-2008-1160
|
||
|
||
BID 28184
|
||
|
||
---------------------------
|
||
|
||
Technical Details
|
||
|
||
---------------------------
|
||
|
||
The vulnerability in the Quagga/Zebra routing daemon, exists due to the
|
||
fact that the appliance fails to change the password needed to login
|
||
into the Quagga/Zebra daemon running on ports 2601, 2602 (Quagga/RIP) &
|
||
2604 (Quagga/OSPF) /TCP, even though the password of the appliance has
|
||
been changed an attacker can still use the default password ‘zebra’ to
|
||
log into the Quagga/Zebra service to view and manipulate the routing
|
||
information etc. of the appliance.
|
||
|
||
The vulnerability was discovered on ZyWall 1050 appliance other versions
|
||
could be affected as well.
|
||
|
||
Information on other vulnerable products and firmwares is pending from
|
||
the vendor’s end.
|
||
|
||
# milw0rm.com [2008-03-21] |