>>>>> On Wed, 11 Apr 2001 19:07:24 -0700, Joey Hess <[EMAIL PROTECTED]> said:
Joey> Here's one way to disable the backdoor: I used the EXPERT login to download
Joey> /active/ip.ini by ftp, removed all the apadd and rdadd lines, turned off
Joey> forwarding for good measure, and re-uploaded it. After resetting the device,
Joey> I can't ping it or connect to it on any port, and yet it still functions as
Joey> a DSL modem. I suppose this closes all the holes except DSLAM access.
Joey> --
Joey> see shy jo
Additionally you can check http://security.sdsc.edu/self-help/alcatel
for tools to crack the binary, and infomration to patch the binary to
remove all the "bad" features.
--tep
--
Tom E. Perrine ([EMAIL PROTECTED]) | San Diego Supercomputer Center
http://www.sdsc.edu/~tep/ | Voice: +1.858.534.5000
"Libertarianism is what your mom taught you: 'Behave yourself
and don't hit your sister."' - Kenneth Bisson of Angola, Ind.
- multiple vulnerabilities in Alcatel Speed Touch DSL mod... Tom Perrine
- Re: multiple vulnerabilities in Alcatel Speed Touc... Gerrie
- Re: multiple vulnerabilities in Alcatel Speed ... Tom Perrine
- Re: multiple vulnerabilities in Alcatel Speed ... Joey Hess
- Re: multiple vulnerabilities in Alcatel Sp... teespy
- Re: multiple vulnerabilities in Alcate... Marcus Butler
- Re: multiple vulnerabilities in Alcatel Sp... Tom Perrine
- Re: multiple vulnerabilities in Alcatel Sp... Hugo van der Kooij
- Re: multiple vulnerabilities in Alcatel Speed Touc... Mark (Mookie)
- Re: multiple vulnerabilities in Alcatel Speed ... Renaud Deraison
- Re: multiple vulnerabilities in Alcatel Speed ... Tom Perrine
- Re: multiple vulnerabilities in Alcatel Speed Touc... SpaceTime
- Re: multiple vulnerabilities in Alcatel Speed ... Bryan K. Watson
- Re: multiple vulnerabilities in Alcatel Speed ... Michael A. Nunes
- Re: multiple vulnerabilities in Alcatel Sp... Matthew Schalit
