How to Buy
This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.
The remote network device is affected by multiple remote
According to the firmware version collected via SNMP, the remote
Apple Time Capsule / AirPort Base Station / AirPort Extreme Base
Station is affected by multiple remote vulnerabilities.
- An integer overflow exists in the
'netsnmp_create_subtree_cache' function that can be
exploited using a specially crafted SNMPv3 packet to
crash the SNMP server. (CVE-2008-4309)
- A remote attacker may be able to crash the racoon
daemon by sending specially crafted fragmented ISAKMP
packets, thereby triggering a NULL pointer dereference.
- By sending a large number of Router Advertisement (RA)
and Neighbor Discovery (ND) packets, an attacker on the
local network can exhaust the base station's resources,
causing it to restart unexpectedly. (CVE-2009-2189)
- An attacker with write access to an FTP server inside
the NAT may be able to use a malicious PORT command to
bypass IP-based restrictions for the service.
- If the device has been configured to act as a bridge or
configured in Network Address Translation (NAT) mode
with a default host enabled (not the default), an
attacker may be able to cause the device to stop
responding using a specially crafted DHCP reply.
See also :
Upgrade the firmware to version 7.5.2 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true
Nessus Plugin ID: 51342 ()
Bugtraq ID: 3202034765454894549045491
CVE ID: CVE-2008-4309CVE-2009-2189CVE-2010-0039CVE-2009-1574CVE-2010-1804
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.