DOS: LinkSys Cable/DSL Router Gozila DomainName Parameter DoS

This signature detects attempts to exploit a vulnerability in a LinkSys Cable/DSL router. Attackers can submit an overly long DomainName parameter within a malicious HTTP request to crash a LinkSys Cable/DSL router.

Extended Description

Multiple Linksys routers are reported vulnerable to a denial of service condition. The issues presents themselves due to a lack of sufficient sanitization performed on parameters that are passed to the Gozila.CGI script. A remote attacker may potentially exploit these conditions to deny service to an affected appliance. It is reported that the device must be reset to the original factory defaults in order to restore normal device functionality.

Affected Products

Linksys befsx41

Short Name
DOS:NETDEV:LINKSYS-GOZILA-DOS3
Severity
Minor
Recommended
False
Recommended Action
None
Category
DOS
Keywords
Cable/DSL DoS DomainName Gozila LinkSys Parameter Router bid:10453
Release Date
06/09/2004
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Linksys

Found a potential security threat?