First published: Thu Nov 03 2011(Updated: )
Buffer overflow in the SSH server functionality on the D-Link DES-3800 with firmware before 4.50B052, DWL-2100AP with firmware before 2.50RC548, and DWL-3200AP with firmware before 2.55RC549 allows remote attackers to execute arbitrary code or cause a denial of service via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DES-3800 | ||
D-Link DES-3800 Firmware | <=4.50 | |
D-Link DES-3800 Firmware | =4.00 | |
D-Link DWL-2100AP | ||
Dlink Dwl-2100ap Firmware | <=2.50 | |
D-Link DWL-3200AP | ||
D-Link DWL-3200AP | <=2.55 | |
D-Link DWL-3200AP | =2.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3992 is a critical vulnerability allowing remote code execution and denial of service.
To fix CVE-2011-3992, upgrade the firmware on D-Link devices to the latest version: 4.50B052 for DES-3800, 2.50RC548 for DWL-2100AP, and 2.55RC549 for DWL-3200AP.
CVE-2011-3992 affects the D-Link DES-3800, DWL-2100AP, and DWL-3200AP with older firmware versions.
Yes, CVE-2011-3992 can be exploited remotely due to a buffer overflow in the SSH server functionality.
The potential impacts of CVE-2011-3992 include arbitrary code execution by attackers and service disruptions.