| VID |
29070 |
| Severity |
30 |
| Port |
80 |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The D-Link router is vulnerable to a Denial of Service attack via the syslog.htm page. If a remote attacker sends an overly long argument to the "syslog.htm" page as the follow:
http://[target_server]/syslog.htm?D=.............(very long string)
the router stops responding. Subsequent malicious requests may result in a complete denial of service condition requiring a device reboot, or in corruption of device logs.
* Note: This check solely relied on the firmware version number of the remote device to assess this vulnerability, so this might be a false positive.
* References: http://www.securityfocus.com/archive/1/322858
* Platforms Affected: D-Link DI-704P firmware version 2.70 and the earlier |
| Recommendation |
No vendor-supplied patches for this vulnerability.
As a workaround, filter incoming traffic to this port (80/tcp). |
| Related URL |
(CVE) |
| Related URL |
7686 (SecurityFocus) |
| Related URL |
(ISS) |
|