SecurityFocus BUGTRAQ Mailing List: BugTraqLink Number One Link Number One Link Number Two Link Number Two Link Number One Link Number One Link Number Two Link Number Two Entire Site Advisories Calendar Columnists Elsewhere Guest Feature Infocus Library Links Mailing Lists (all) -- BUGTRAQ -- FOCUS-IDS -- FOCUS-IH -- FOCUS-LINUX -- FOCUS-MS -- FOCUS-SUN -- FOCUS-VIRUS -- FORENSICS -- INCIDENTS -- PEN-TEST -- SEC JOBS -- SF NEWS -- VULN-DEV News Products Services Tools Vulns BUGTRAQ ARCHIVE [ Message Index ] [ Thread Index ][ Reply ] [ prev Msg by Date ][ next Msg by Date ] To: BugTraq Subject: Conexant Access Runner DSL Console login bypass vulnerability Date: Oct 4 2003 2:13PM Author: Chris Norton Message-ID: <20031004141340.18370.qmail@sf-www1-symnsj.securityfocus.com> A vulnerability has been discovered in the Conexant Access Runner DSL Console Port 3.21. This vulnerability will let a remote attacker bypass the login screen and have full admin rights even if admin password is set. The login bypass works in the following way: When at login screen you may press any key to get the invalid password, please try again message. At this point all an attacker has to do is tap the [ENTER] key to gain access to the main menu of the system with admin rights. This has been found to work on all 3.21 versions. At this time I am not aware of a fix as I could not get in contact with Conexant about this issue. Want to link to this message? Use this URL: Disclaimer, Terms & Conditions About this List Featured Lists: ARIS Users bugtraq bugtraq-es bugtraq-french NEW bugtraq-jp firewalls focus-ids focus-ih focus-linux focus-ms focus-sun focus-unix-other focus-virus forensics forensics-es honeypots incidents libnet pen-test secevents secpapers secprog sectools secureshell security-basics security-management NEW securityjobs vpn vuln-dev webappsec Newsletters: sf-news ms-secnews linux-secnews [ more . . . ] Privacy Statement Copyright © 1999-2003 SecurityFocus