Linksys WAG200G - Information disclosure (fwd)

I wonder what their security process is for other types of routers?

I wonder what their security process is for other types of routers?

Try psirt@cisco.com

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html#Problems

-Robert

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>I wonder what their security process is for other types of routers?

Try psirt@cisco.com

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html#Problems

-Robert

Thanks Robert.

Linksys' product security folks can also be reached directly at
security@linksys.com. Feel free to copy us on any vulnerability reports
and we can help to ensure that the right folks have received the report
to address any issues.

- -Mike-

- --

Mike Caudill <mcaudill@cisco.com>
PSIRT Incident Manager
DSS PGP: 0xEBBD5271
+1.919.392.2855 / +1.919.522.4931 (cell)
http://www.cisco.com/go/psirt

Knowing PSIRT is available to handle these issues for Linksys is very
reassuring. Thanks Mike.

  Gadi.

Karin and me have just completed a little test, in case you own such a router.

On the IASON homepage

http://iason.site.voila.fr

scroll down, look for the picture of the two pirates and klick

Port 916 Backdoor

the file

udp916.tgz

contains Makefile and sources for "test916 <router name or ip>" and
in case your router does not answer port 916 udp a little server
"server-916". The server must be run as root. It will terminate
after the first test from the client, telling you at least the
query from the client and the name and ip-addresses.

Enjoy
Peter and Karin Dambier

Robert Boyle wrote: