6 results (0.002 seconds)

CVSS: 6.1EPSS: 0%CPEs: 12EXPL: 0

The ICMPv6 implementation on the Apple Time Capsule, AirPort Extreme Base Station, and AirPort Express Base Station with firmware before 7.5.2 does not limit the rate of (1) Router Advertisement and (2) Neighbor Discovery packets, which allows remote attackers to cause a denial of service (resource consumption and device restart) by sending many packets. La implementación ICMPv6 en Apple Time Capsule, AirPort Extreme Base Station, y AirPort Express Base Station con firmware anterior a v7.5.2 no limita la tasa de paquetes (1) Router Advertisement y (2) Neighbor Discovery, lo cual permite a los atacantes remotos causar una denegación de servicio (consumo de recursos y reinicio del dispositivo) a través del envío de muchos paquetes. • http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html http://support.apple.com/kb/HT4298 http://www.securitytracker.com/id?1024907 • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 0%CPEs: 12EXPL: 0

Unspecified vulnerability in the network bridge functionality on the Apple Time Capsule, AirPort Extreme Base Station, and AirPort Express Base Station with firmware before 7.5.2 allows remote attackers to cause a denial of service (networking outage) via a crafted DHCP reply. Vulnerabilidad no especificada en la funcionalidad network bridge en Apple Time Capsule, AirPort Extreme Base Station, y AirPort Express Base Station con firmware anterior a v7.5.2 permite a los atacantes remotos causar una denegcaión de servicio (desconexión de red) a través de peticiones DHCP manipuladas. • http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html http://support.apple.com/kb/HT4298 http://www.securitytracker.com/id?1024907 •

CVSS: 2.6EPSS: 0%CPEs: 12EXPL: 0

The Application-Level Gateway (ALG) on the Apple Time Capsule, AirPort Extreme Base Station, and AirPort Express Base Station with firmware before 7.5.2 modifies PORT commands in incoming FTP traffic, which allows remote attackers to use the device's IP address for arbitrary intranet TCP traffic by leveraging write access to an intranet FTP server. Application-Level Gateway (ALG) en Apple Time Capsule, AirPort Extreme Base Station, y AirPort Express Base Station con firmware anterior v7.5.2 modifica los comandos PORT en el tráfico FTP, lo que permite a atacantes remotos usar la dirección IP del dispositivo para tráfico de intranet TCP de su elección aprovechando el acceso de escritura en el servidor FTP de intranet. • http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html http://support.apple.com/kb/HT4298 http://www.securitytracker.com/id?1024907 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 1

The FTP proxy server in Apple AirPort Express, AirPort Extreme, and Time Capsule with firmware 7.5 does not restrict the IP address and port specified in a PORT command from a client, which allows remote attackers to leverage intranet FTP servers for arbitrary TCP forwarding via a crafted PORT command. El servidor FTP proxy en Apple AirPort Express, AirPort Extreme, y Time Capsule con firmware v7.5, no limita las direcciones IP y los puertos en los comandos PORT desde los clientes, lo que permite a atacantes remotos aprovechar los servidores FTP de la intranet para el seguimiento TCP a través de un comando PORTA manipulado. • http://seclists.org/fulldisclosure/2010/Mar/106 http://www.securityfocus.com/archive/1/509867/100/0/threaded http://www.securityfocus.com/archive/1/509974/100/0/threaded http://www.securityfocus.com/bid/38543 https://exchange.xforce.ibmcloud.com/vulnerabilities/56701 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 0

The network interface for Apple AirPort Express 6.x before Firmware Update 6.3, and AirPort Extreme 5.x before Firmware Update 5.7, allows remote attackers to cause a denial of service (unresponsive interface) via malformed packets. • http://lists.apple.com/archives/security-announce/2006/Jan/msg00000.html http://secunia.com/advisories/18319 http://securitytracker.com/id?1015443 http://www.osvdb.org/22244 http://www.securityfocus.com/bid/16146 http://www.vupen.com/english/advisories/2006/0064 • CWE-399: Resource Management Errors •