The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Teldat Bintec R

vulnerability bulletin 12843

Bintec R, X: infinite loop of A-MPDU

Synthesis of the vulnerability

An attacker can send a malformed A-MPDU (Aggregated MAC Protocol Data Unit) packet, to generate an infinite loop in Bintec R/X, in order to trigger a denial of service.
Impacted products: Bintec R, Bintec X.
Severity: 2/4.
Consequences: denial of service on server.
Provenance: intranet client.
Creation date: 17/05/2013.
Identifiers: VIGILANCE-VUL-12843.

Description of the vulnerability

An attacker can send a malformed A-MPDU (Aggregated MAC Protocol Data Unit) packet, to generate an infinite loop in Bintec R/X, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin 8203

Bintec R: poisoning the DNS cache

Synthesis of the vulnerability

An attacker can send malicious DNS queries in order to poison the DNS cache of Bintec R.
Impacted products: Bintec R.
Severity: 3/4.
Consequences: data creation/edition.
Provenance: internet server.
Creation date: 27/10/2008.
Identifiers: VIGILANCE-VUL-8203.

Description of the vulnerability

In the DNS protocol, a server is authoritative ("in bailiwick") for a zone it has a delegation for, granted by a superior DNS server.

For example, a DNS server of ".com" can indicate that 1.2.3.4 is the authoritative server for "example.com". In this case, 1.2.3.4 should only provide information for the "example.com" domain. If the 1.2.3.4 server is malicious, and sends information for "victim.com", these information (which are out of bailiwick) have to be ignored.

However, the DNS cache implemented in Bintec R does not check this case and accepts all records.

This vulnerability can therefore be used by an attacker to add malicious records in the DNS cache.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin 6488

Bintec X: denial of service of SSH

Synthesis of the vulnerability

An attacker may generate a denial of service by connecting to the SSH port.
Impacted products: Bintec R, Bintec X.
Severity: 1/4.
Consequences: denial of service on service.
Provenance: intranet client.
Creation date: 24/01/2007.
Identifiers: VIGILANCE-VUL-6488.

Description of the vulnerability

An attacker may generate a denial of service by connecting to the SSH port.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert 4796

Bintec : multiples problèmes

Synthesis of the vulnerability

De nouvelles versions du logiciel corrigent plusieurs problèmes de Bintec.
Impacted products: Bintec R, Bintec X.
Severity: 2/4.
Consequences: denial of service on server.
Provenance: LAN.
Creation date: 03/03/2005.
Identifiers: V6-BINTECMULPB, VIGILANCE-VUL-4796.

Description of the vulnerability

De nouvelles versions du logiciel corrigent plusieurs problèmes. Certains de ces problèmes pourraient avoir un impact sur la sécurité, mais les informations ne sont pas suffisamment détaillées pour le confirmer.

Lorsque certaines commandes ont des paramètres supplémentaires, un redémarrage peut se produire dans SNMP Shell (référence 2979).

Les paquets Ethernet de taille supérieure à 1518 octets ne sont pas gérés correctement (référence 3583).

Une requête DHCP de type renew peut provoquer un redémarrage (référence 3670).
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Teldat Bintec R: