First published: Thu Jan 23 2014(Updated: )
The OSPF implementation on Yamaha routers does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yamaha FWX120 firmware | ||
Yamaha RT105P | ||
Yamaha RT107E | ||
Yamaha RT140 | ||
Yamaha Rt250i | ||
Yamaha RT300i | ||
Yamaha RTX1000 | ||
Yamaha RTX1100 | ||
Yamaha RTX1200 firmware | ||
Yamaha RTX1500 | ||
Yamaha RTX2000 | ||
Yamaha RTX3000 | ||
Yamaha RTX810 | ||
Yamaha SRT100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7310 has a high severity rating due to its potential to cause denial of service on affected Yamaha routers.
Mitigation for CVE-2013-7310 involves ensuring that the latest firmware updates are applied to the affected Yamaha devices.
CVE-2013-7310 affects various Yamaha router models including the FWX120, RT105P, RT107E, and RTX series.
Exploiting CVE-2013-7310 can lead to routing disruptions and potential exposure of sensitive information.
Remote attackers with knowledge of the vulnerability can exploit CVE-2013-7310 to cause a denial of service.