Search criteria
4 vulnerabilities found for 580 by snapgear
VAR-200703-0036
Vulnerability from variot - Updated: 2024-02-14 23:01SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613. SnapGear is prone to a denial-of-service vulnerability because the device fails to handle exceptional conditions. An attacker can exploit this issue to cause the affected device to stop processing packets, denying service to legitimate users. This issue affects the 560, 585, 580, 640, 710, and 720 models. This vulnerability is different from CVE-2006-4613.
Want a new job? http://secunia.com/secunia_vacancies/
Secunia is looking for new researchers with a reversing background and experience in writing exploit code: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ http://secunia.com/Disassembling_og_Reversing/
TITLE: SnapGear Packet Handling Denial of Service
SECUNIA ADVISORY ID: SA24388
VERIFY ADVISORY: http://secunia.com/advisories/24388/
CRITICAL: Less critical
IMPACT: DoS
WHERE:
From remote
OPERATING SYSTEM: SnapGear 3.x http://secunia.com/product/11807/
DESCRIPTION: A vulnerability has been reported in SnapGear, which can be exploited by malicious people to cause a DoS (Denial of Service).
An unspecified error can be exploited to cause all packets to be dropped when the device is under a packet flood.
SOLUTION: Update to firmware version 3.1.4u5.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://www.cyberguard.info/snapgear/releases.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200703-0036",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "710",
"scope": "eq",
"trust": 1.6,
"vendor": "snapgear",
"version": "1.8_firmware"
},
{
"model": "720",
"scope": "eq",
"trust": 1.6,
"vendor": "snapgear",
"version": "1.7.8_firmware"
},
{
"model": "720",
"scope": "eq",
"trust": 1.6,
"vendor": "snapgear",
"version": "1.8.4_firmware"
},
{
"model": "560",
"scope": "eq",
"trust": 1.6,
"vendor": "snapgear",
"version": "1.7.10_firmware"
},
{
"model": "720",
"scope": "eq",
"trust": 1.6,
"vendor": "snapgear",
"version": "1.8_firmware"
},
{
"model": "720",
"scope": "eq",
"trust": 1.6,
"vendor": "snapgear",
"version": "1.8.5_firmware"
},
{
"model": "720",
"scope": "eq",
"trust": 1.6,
"vendor": "snapgear",
"version": "3.1.4u2_firmware"
},
{
"model": "720",
"scope": "eq",
"trust": 1.6,
"vendor": "snapgear",
"version": "1.7.10_firmware"
},
{
"model": "560",
"scope": "eq",
"trust": 1.6,
"vendor": "snapgear",
"version": "1.7.8_firmware"
},
{
"model": "710",
"scope": "eq",
"trust": 1.6,
"vendor": "snapgear",
"version": "3.1.4u2_firmware"
},
{
"model": "580",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.7.9_firmware"
},
{
"model": "560",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.8.5_firmware"
},
{
"model": "580",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.8_firmware"
},
{
"model": "585",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.7.9_firmware"
},
{
"model": "585",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.8_firmware"
},
{
"model": "580",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "3.1.4u2_firmware"
},
{
"model": "710",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.8.5_firmware"
},
{
"model": "710",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.7.8_firmware"
},
{
"model": "585",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "3.1.4u2_firmware"
},
{
"model": "640",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.8.5_firmware"
},
{
"model": "560",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.8.4_firmware"
},
{
"model": "640",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.7.8_firmware"
},
{
"model": "710",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.7.10_firmware"
},
{
"model": "710",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.8.4_firmware"
},
{
"model": "640",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.8.4_firmware"
},
{
"model": "560",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "3.1.4u2"
},
{
"model": "640",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.7.10_firmware"
},
{
"model": "560",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.7.9_firmware"
},
{
"model": "710",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.7.9_firmware"
},
{
"model": "720",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.7.9_firmware"
},
{
"model": "560",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.8_firmware"
},
{
"model": "580",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.8.5_firmware"
},
{
"model": "640",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.7.9_firmware"
},
{
"model": "585",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.8.5_firmware"
},
{
"model": "640",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.8_firmware"
},
{
"model": "580",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.7.8_firmware"
},
{
"model": "585",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.7.8_firmware"
},
{
"model": "640",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "3.1.4u2_firmware"
},
{
"model": "580",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.8.4_firmware"
},
{
"model": "580",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.7.10_firmware"
},
{
"model": "585",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.8.4_firmware"
},
{
"model": "585",
"scope": "eq",
"trust": 1.0,
"vendor": "snapgear",
"version": "1.7.10_firmware"
},
{
"model": "560",
"scope": "lt",
"trust": 0.8,
"vendor": "snapgear",
"version": "3.1.4u5"
},
{
"model": "580",
"scope": "lt",
"trust": 0.8,
"vendor": "snapgear",
"version": "3.1.4u5"
},
{
"model": "585",
"scope": "lt",
"trust": 0.8,
"vendor": "snapgear",
"version": "3.1.4u5"
},
{
"model": "640",
"scope": "lt",
"trust": 0.8,
"vendor": "snapgear",
"version": "3.1.4u5"
},
{
"model": "710",
"scope": "lt",
"trust": 0.8,
"vendor": "snapgear",
"version": "3.1.4u5"
},
{
"model": "720",
"scope": "lt",
"trust": 0.8,
"vendor": "snapgear",
"version": "3.1.4u5"
},
{
"model": "os u2",
"scope": "eq",
"trust": 0.3,
"vendor": "snapgear",
"version": "3.1.4"
},
{
"model": "os",
"scope": "eq",
"trust": 0.3,
"vendor": "snapgear",
"version": "1.8.5"
},
{
"model": "os",
"scope": "eq",
"trust": 0.3,
"vendor": "snapgear",
"version": "1.8.4"
},
{
"model": "os",
"scope": "eq",
"trust": 0.3,
"vendor": "snapgear",
"version": "1.8"
},
{
"model": "os",
"scope": "eq",
"trust": 0.3,
"vendor": "snapgear",
"version": "1.7.10"
},
{
"model": "os",
"scope": "eq",
"trust": 0.3,
"vendor": "snapgear",
"version": "1.7.9"
},
{
"model": "os",
"scope": "eq",
"trust": 0.3,
"vendor": "snapgear",
"version": "1.7.8"
},
{
"model": "os 3.1.4u5",
"scope": "ne",
"trust": 0.3,
"vendor": "snapgear",
"version": null
}
],
"sources": [
{
"db": "BID",
"id": "22835"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005211"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-233"
},
{
"db": "NVD",
"id": "CVE-2007-1324"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:snapgear:710:1.8_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:580:3.1.4u2_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:585:1.7.8_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:560:1.7.9_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:640:1.7.9_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:640:3.1.4u2_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:580:1.8.4_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:720:1.8_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:580:1.7.9_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:640:1.7.10_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:580:1.7.8_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:640:1.8.5_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:720:3.1.4u2_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:585:1.8_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:585:1.7.10_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:720:1.7.9_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:720:1.8.5_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:720:1.7.10_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:580:1.8.5_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:585:1.8.4_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:560:1.8.5_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:710:3.1.4u2_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:585:3.1.4u2_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:580:1.7.10_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:710:1.7.8_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:560:1.7.10_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:560:3.1.4u2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:640:1.8_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:560:1.7.8_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:585:1.7.9_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:585:1.8.5_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:560:1.8.4_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:710:1.8.5_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:710:1.8.4_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:720:1.7.8_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:710:1.7.10_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:580:1.8_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:640:1.8.4_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:720:1.8.4_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:560:1.8_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:710:1.7.9_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:snapgear:640:1.7.8_firmware:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-1324"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "22835"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-233"
}
],
"trust": 0.9
},
"cve": "CVE-2007-1324",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2007-1324",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-24686",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2007-1324",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200703-233",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-24686",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-24686"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005211"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-233"
},
{
"db": "NVD",
"id": "CVE-2007-1324"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613. SnapGear is prone to a denial-of-service vulnerability because the device fails to handle exceptional conditions. \nAn attacker can exploit this issue to cause the affected device to stop processing packets, denying service to legitimate users. \nThis issue affects the 560, 585, 580, 640, 710, and 720 models. This vulnerability is different from CVE-2006-4613. \n\n----------------------------------------------------------------------\n\nWant a new job?\nhttp://secunia.com/secunia_vacancies/\n\nSecunia is looking for new researchers with a reversing background\nand experience in writing exploit code:\nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\nhttp://secunia.com/Disassembling_og_Reversing/\n\n----------------------------------------------------------------------\n\nTITLE:\nSnapGear Packet Handling Denial of Service\n\nSECUNIA ADVISORY ID:\nSA24388\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/24388/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nSnapGear 3.x\nhttp://secunia.com/product/11807/\n\nDESCRIPTION:\nA vulnerability has been reported in SnapGear, which can be exploited\nby malicious people to cause a DoS (Denial of Service). \n\nAn unspecified error can be exploited to cause all packets to be\ndropped when the device is under a packet flood. \n\nSOLUTION:\nUpdate to firmware version 3.1.4u5. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.cyberguard.info/snapgear/releases.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-1324"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005211"
},
{
"db": "BID",
"id": "22835"
},
{
"db": "VULHUB",
"id": "VHN-24686"
},
{
"db": "PACKETSTORM",
"id": "54857"
}
],
"trust": 2.07
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2007-1324",
"trust": 2.8
},
{
"db": "BID",
"id": "22835",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "24388",
"trust": 1.8
},
{
"db": "OSVDB",
"id": "33864",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2007-0850",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005211",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200703-233",
"trust": 0.7
},
{
"db": "XF",
"id": "32824",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-24686",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "54857",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-24686"
},
{
"db": "BID",
"id": "22835"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005211"
},
{
"db": "PACKETSTORM",
"id": "54857"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-233"
},
{
"db": "NVD",
"id": "CVE-2007-1324"
}
]
},
"id": "VAR-200703-0036",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-24686"
}
],
"trust": 0.01
},
"last_update_date": "2024-02-14T23:01:39.421000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-1324"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.1,
"url": "http://www.cyberguard.info/snapgear/releases.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/22835"
},
{
"trust": 1.7,
"url": "http://osvdb.org/33864"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/24388"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2007/0850"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1324"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1324"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/32824"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2007/0850"
},
{
"trust": 0.3,
"url": "http://www.snapgear.com/liteplus.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/11807/"
},
{
"trust": 0.1,
"url": "http://secunia.com/disassembling_og_reversing/"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_vacancies/"
},
{
"trust": 0.1,
"url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/24388/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-24686"
},
{
"db": "BID",
"id": "22835"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005211"
},
{
"db": "PACKETSTORM",
"id": "54857"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-233"
},
{
"db": "NVD",
"id": "CVE-2007-1324"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-24686"
},
{
"db": "BID",
"id": "22835"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005211"
},
{
"db": "PACKETSTORM",
"id": "54857"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-233"
},
{
"db": "NVD",
"id": "CVE-2007-1324"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-03-07T00:00:00",
"db": "VULHUB",
"id": "VHN-24686"
},
{
"date": "2007-03-06T00:00:00",
"db": "BID",
"id": "22835"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-005211"
},
{
"date": "2007-03-08T00:54:52",
"db": "PACKETSTORM",
"id": "54857"
},
{
"date": "2007-03-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200703-233"
},
{
"date": "2007-03-07T21:19:00",
"db": "NVD",
"id": "CVE-2007-1324"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-29T00:00:00",
"db": "VULHUB",
"id": "VHN-24686"
},
{
"date": "2015-05-12T19:33:00",
"db": "BID",
"id": "22835"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-005211"
},
{
"date": "2007-03-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200703-233"
},
{
"date": "2024-02-14T01:17:43.863000",
"db": "NVD",
"id": "CVE-2007-1324"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200703-233"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SnapGear Service disruption in (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-005211"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200703-233"
}
],
"trust": 0.6
}
}
FKIE_CVE-2007-1324
Vulnerability from fkie_nvd - Published: 2007-03-07 21:19 - Updated: 2025-04-09 00:30| Vendor | Product | Version | |
|---|---|---|---|
| snapgear | 560 | 1.7.8_firmware | |
| snapgear | 560 | 1.7.9_firmware | |
| snapgear | 560 | 1.7.10_firmware | |
| snapgear | 560 | 1.8.4_firmware | |
| snapgear | 560 | 1.8.5_firmware | |
| snapgear | 560 | 1.8_firmware | |
| snapgear | 560 | 3.1.4u2 | |
| snapgear | 580 | 1.7.8_firmware | |
| snapgear | 580 | 1.7.9_firmware | |
| snapgear | 580 | 1.7.10_firmware | |
| snapgear | 580 | 1.8.4_firmware | |
| snapgear | 580 | 1.8.5_firmware | |
| snapgear | 580 | 1.8_firmware | |
| snapgear | 580 | 3.1.4u2_firmware | |
| snapgear | 585 | 1.7.8_firmware | |
| snapgear | 585 | 1.7.9_firmware | |
| snapgear | 585 | 1.7.10_firmware | |
| snapgear | 585 | 1.8.4_firmware | |
| snapgear | 585 | 1.8.5_firmware | |
| snapgear | 585 | 1.8_firmware | |
| snapgear | 585 | 3.1.4u2_firmware | |
| snapgear | 640 | 1.7.8_firmware | |
| snapgear | 640 | 1.7.9_firmware | |
| snapgear | 640 | 1.7.10_firmware | |
| snapgear | 640 | 1.8.4_firmware | |
| snapgear | 640 | 1.8.5_firmware | |
| snapgear | 640 | 1.8_firmware | |
| snapgear | 640 | 3.1.4u2_firmware | |
| snapgear | 710 | 1.7.8_firmware | |
| snapgear | 710 | 1.7.9_firmware | |
| snapgear | 710 | 1.7.10_firmware | |
| snapgear | 710 | 1.8.4_firmware | |
| snapgear | 710 | 1.8.5_firmware | |
| snapgear | 710 | 1.8_firmware | |
| snapgear | 710 | 3.1.4u2_firmware | |
| snapgear | 720 | 1.7.8_firmware | |
| snapgear | 720 | 1.7.9_firmware | |
| snapgear | 720 | 1.7.10_firmware | |
| snapgear | 720 | 1.8.4_firmware | |
| snapgear | 720 | 1.8.5_firmware | |
| snapgear | 720 | 1.8_firmware | |
| snapgear | 720 | 3.1.4u2_firmware |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:snapgear:560:1.7.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "2CE2340F-9228-4491-BD18-237518BE8883",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:560:1.7.9_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F6607D-ACA3-4D08-940D-2CE3B4BDBDF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:560:1.7.10_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "A428A676-006B-4313-8D1E-7281E87152DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:560:1.8.4_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "69C18664-B609-460B-84EB-3A79EE5D9AB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:560:1.8.5_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "F292707F-180B-493B-AA5D-0DC6ABF86E05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:560:1.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "0F8BD2FF-8D2E-4ADA-9372-50BFA0BE5A14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:560:3.1.4u2:*:*:*:*:*:*:*",
"matchCriteriaId": "8BF22988-69AF-48EE-9CF7-56DE94E1A32B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:580:1.7.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "1518061C-7B28-4ECC-B891-DD7474F0F908",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:580:1.7.9_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "C44C97ED-41CA-43ED-AE5F-28BE852468C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:580:1.7.10_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "FF1D4E8B-15CB-4431-B00C-71FF6B409F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:580:1.8.4_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "9B9DF9CF-CC4D-463F-8906-C30C5D63CE0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:580:1.8.5_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "881D6995-B00E-4F7A-B242-7774F3358BAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:580:1.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "C964D968-EB4B-4A26-9806-9F87D7D7432D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:580:3.1.4u2_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "72E71919-E23B-4B0F-872D-49626D13E762",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:585:1.7.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "C7C0739F-513C-4553-887F-9935FB09D0B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:585:1.7.9_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "40D50ED5-7FB8-4878-A519-CB610AB87D81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:585:1.7.10_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A68998-9F26-42EE-AD7F-7660409CFE99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:585:1.8.4_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "122D11B3-3044-4BCC-97F8-753720AC6615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:585:1.8.5_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "7E66842F-3EC5-4089-8782-2B063D4457A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:585:1.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "0B58ABEC-7257-456F-952B-C913D5C59FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:585:3.1.4u2_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "7D4B9B73-C47D-4183-88F4-717028E64840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:640:1.7.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "D79801B0-952C-448C-A25D-AAE002DA4200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:640:1.7.9_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "E1F43EEB-7F6E-4D4C-BFA5-5BEDA1A54557",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:640:1.7.10_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "7D78AC34-6C21-4162-9777-A7563FD56075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:640:1.8.4_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "3BEC2E82-E2A6-4D38-8315-5BBFFBF507FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:640:1.8.5_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "0C92B730-3FDF-4BBE-BF87-6962E58B3611",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:640:1.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "8124ED35-32B6-4D66-B658-2585B18970D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:640:3.1.4u2_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "69A20968-FCE5-462B-911E-2074D0ECD56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:710:1.7.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "28B080D5-858C-464E-932A-53A6730AC5F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:710:1.7.9_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "78C587BD-DC7E-4EC8-800C-CE21029C3BF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:710:1.7.10_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "327B9621-D6C1-49AB-BF85-57EB9F3E6035",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:710:1.8.4_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD5C0BE-34CB-43D2-AF9E-8F1480A02281",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:710:1.8.5_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "AB2D37B0-FBE1-4A98-8562-01DE1F828D1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:710:1.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "A0D8045C-E9FA-42B2-8824-F27133608AC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:710:3.1.4u2_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "33971918-8B65-46AB-84DD-695081B724D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:720:1.7.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "EB898390-05D1-485D-B258-7B0F246F0A21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:720:1.7.9_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "BAA03627-9DA9-40E0-BEBA-F2CB00C04EC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:720:1.7.10_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "F90B69E9-72BD-4C0F-A045-A2BC11B651FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:720:1.8.4_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "26BF65DA-20F6-4956-B54A-004FFBAA2756",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:720:1.8.5_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "A9DB2DC3-20D9-4677-AC3D-0C05A16F7FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:720:1.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "64ADDE44-D64D-4C85-85ED-28CD9828DDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:720:3.1.4u2_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "F6431FA9-06C5-48F4-B236-FD72A4C3F03F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613."
},
{
"lang": "es",
"value": "Los dispositivos (appliance) SnapGear 560, 585, 580, 640, 710, y 720 versiones anteriores al firmware 3.1.4u5, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (p\u00e9rdida completa de paquete) mediante una inundaci\u00f3n de paquetes, vulnerabilidad distinta a CVE-2006-4613."
}
],
"id": "CVE-2007-1324",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-03-07T21:19:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/33864"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/24388"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory",
"URL Repurposed"
],
"url": "http://www.cyberguard.info/snapgear/releases.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22835"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/0850"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/33864"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/24388"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory",
"URL Repurposed"
],
"url": "http://www.cyberguard.info/snapgear/releases.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22835"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/0850"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2007-1324 (GCVE-0-2007-1324)
Vulnerability from cvelistv5 – Published: 2007-03-07 21:00 – Updated: 2024-08-07 12:50- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:50:35.586Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "33864",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/33864"
},
{
"name": "snapgear-packet-dos(32824)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
},
{
"name": "24388",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24388"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cyberguard.info/snapgear/releases.html"
},
{
"name": "22835",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22835"
},
{
"name": "ADV-2007-0850",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0850"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "33864",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/33864"
},
{
"name": "snapgear-packet-dos(32824)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
},
{
"name": "24388",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24388"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cyberguard.info/snapgear/releases.html"
},
{
"name": "22835",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22835"
},
{
"name": "ADV-2007-0850",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0850"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1324",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "33864",
"refsource": "OSVDB",
"url": "http://osvdb.org/33864"
},
{
"name": "snapgear-packet-dos(32824)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
},
{
"name": "24388",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24388"
},
{
"name": "http://www.cyberguard.info/snapgear/releases.html",
"refsource": "CONFIRM",
"url": "http://www.cyberguard.info/snapgear/releases.html"
},
{
"name": "22835",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22835"
},
{
"name": "ADV-2007-0850",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0850"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1324",
"datePublished": "2007-03-07T21:00:00",
"dateReserved": "2007-03-07T00:00:00",
"dateUpdated": "2024-08-07T12:50:35.586Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-1324 (GCVE-0-2007-1324)
Vulnerability from nvd – Published: 2007-03-07 21:00 – Updated: 2024-08-07 12:50- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:50:35.586Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "33864",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/33864"
},
{
"name": "snapgear-packet-dos(32824)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
},
{
"name": "24388",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24388"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cyberguard.info/snapgear/releases.html"
},
{
"name": "22835",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22835"
},
{
"name": "ADV-2007-0850",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0850"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "33864",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/33864"
},
{
"name": "snapgear-packet-dos(32824)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
},
{
"name": "24388",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24388"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cyberguard.info/snapgear/releases.html"
},
{
"name": "22835",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22835"
},
{
"name": "ADV-2007-0850",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0850"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1324",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "33864",
"refsource": "OSVDB",
"url": "http://osvdb.org/33864"
},
{
"name": "snapgear-packet-dos(32824)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
},
{
"name": "24388",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24388"
},
{
"name": "http://www.cyberguard.info/snapgear/releases.html",
"refsource": "CONFIRM",
"url": "http://www.cyberguard.info/snapgear/releases.html"
},
{
"name": "22835",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22835"
},
{
"name": "ADV-2007-0850",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0850"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1324",
"datePublished": "2007-03-07T21:00:00",
"dateReserved": "2007-03-07T00:00:00",
"dateUpdated": "2024-08-07T12:50:35.586Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}