Search criteria
15 vulnerabilities found for blackberry by rim
VAR-200911-0136
Vulnerability from variot - Updated: 2023-12-18 13:44Research In Motion (RIM) BlackBerry Browser on the BlackBerry 8800 allows remote attackers to cause a denial of service (application hang) via a JavaScript loop that configures the home page by using the setHomePage method and a DHTML behavior property. Blackberry Browser is prone to a denial-of-service vulnerability
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200911-0136",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "blackberry 8800",
"scope": "eq",
"trust": 1.0,
"vendor": "rim",
"version": "*"
},
{
"model": "blackberry browser",
"scope": "eq",
"trust": 1.0,
"vendor": "rim",
"version": "*"
},
{
"model": "8800",
"scope": null,
"trust": 0.8,
"vendor": "blackberry",
"version": null
},
{
"model": "browser",
"scope": null,
"trust": 0.8,
"vendor": "blackberry",
"version": null
},
{
"model": "blackberry browser",
"scope": null,
"trust": 0.6,
"vendor": "rim",
"version": null
},
{
"model": "blackberry browser",
"scope": "eq",
"trust": 0.3,
"vendor": "rim",
"version": "0"
},
{
"model": "blackberry",
"scope": "eq",
"trust": 0.3,
"vendor": "rim",
"version": "88000"
}
],
"sources": [
{
"db": "BID",
"id": "79287"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-002700"
},
{
"db": "NVD",
"id": "CVE-2009-3944"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-167"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rim:blackberry_browser:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rim:blackberry_8800:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2009-3944"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "79287"
}
],
"trust": 0.3
},
"cve": "CVE-2009-3944",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2009-3944",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2009-3944",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200911-167",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-002700"
},
{
"db": "NVD",
"id": "CVE-2009-3944"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-167"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Research In Motion (RIM) BlackBerry Browser on the BlackBerry 8800 allows remote attackers to cause a denial of service (application hang) via a JavaScript loop that configures the home page by using the setHomePage method and a DHTML behavior property. Blackberry Browser is prone to a denial-of-service vulnerability",
"sources": [
{
"db": "NVD",
"id": "CVE-2009-3944"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-002700"
},
{
"db": "BID",
"id": "79287"
}
],
"trust": 1.89
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2009-3944",
"trust": 2.7
},
{
"db": "JVNDB",
"id": "JVNDB-2009-002700",
"trust": 0.8
},
{
"db": "BUGTRAQ",
"id": "20091109 RE: DOS VULNERABILITY IN INTERNET EXPLORER",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200911-167",
"trust": 0.6
},
{
"db": "BID",
"id": "79287",
"trust": 0.3
}
],
"sources": [
{
"db": "BID",
"id": "79287"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-002700"
},
{
"db": "NVD",
"id": "CVE-2009-3944"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-167"
}
]
},
"id": "VAR-200911-0136",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 1.0
},
"last_update_date": "2023-12-18T13:44:53.560000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://ap.blackberry.com/jpn"
},
{
"title": "BlackBerry 8800 Series",
"trust": 0.8,
"url": "http://worldwide.blackberry.com/blackberry8800"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-002700"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-002700"
},
{
"db": "NVD",
"id": "CVE-2009-3944"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.0,
"url": "http://www.securityfocus.com/archive/1/507759/100/0/threaded"
},
{
"trust": 0.9,
"url": "http://www.securityfocus.com/archive/1/archive/1/507759/100/0/threaded"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3944"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-3944"
}
],
"sources": [
{
"db": "BID",
"id": "79287"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-002700"
},
{
"db": "NVD",
"id": "CVE-2009-3944"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-167"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "79287"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-002700"
},
{
"db": "NVD",
"id": "CVE-2009-3944"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-167"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-11-16T00:00:00",
"db": "BID",
"id": "79287"
},
{
"date": "2011-12-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-002700"
},
{
"date": "2009-11-16T19:30:01.127000",
"db": "NVD",
"id": "CVE-2009-3944"
},
{
"date": "2009-11-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200911-167"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-11-16T00:00:00",
"db": "BID",
"id": "79287"
},
{
"date": "2011-12-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-002700"
},
{
"date": "2018-10-10T19:47:53.500000",
"db": "NVD",
"id": "CVE-2009-3944"
},
{
"date": "2009-11-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200911-167"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200911-167"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "BlackBerry 8800 upper RIM BlackBerry Browser Service disruption in (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-002700"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200911-167"
}
],
"trust": 0.6
}
}
VAR-200703-0571
Vulnerability from variot - Updated: 2023-12-18 13:20The 4thPass browser (BlackBerry Browser) on the RIM BlackBerry 8100 (Pearl) before 4.2.1 allows remote attackers to cause a denial of service (temporary functionality loss) via a long href attribute in a link in a WML page. Blackberry 8100 is prone to a denial-of-service vulnerability
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200703-0571",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "blackberry browser",
"scope": "eq",
"trust": 1.0,
"vendor": "rim",
"version": "_nil_"
},
{
"model": "blackberry",
"scope": "eq",
"trust": 1.0,
"vendor": "rim",
"version": "8100"
},
{
"model": "blackberry 8100",
"scope": "eq",
"trust": 1.0,
"vendor": "rim",
"version": "*"
},
{
"model": "8100",
"scope": "lt",
"trust": 0.8,
"vendor": "blackberry",
"version": "4.2.1"
},
{
"model": "browser",
"scope": null,
"trust": 0.8,
"vendor": "blackberry",
"version": null
},
{
"model": "blackberry 8100",
"scope": null,
"trust": 0.6,
"vendor": "rim",
"version": null
},
{
"model": "blackberry browser nil",
"scope": null,
"trust": 0.3,
"vendor": "rim",
"version": null
},
{
"model": "blackberry",
"scope": "eq",
"trust": 0.3,
"vendor": "rim",
"version": "81000"
}
],
"sources": [
{
"db": "BID",
"id": "86540"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005244"
},
{
"db": "NVD",
"id": "CVE-2007-1441"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-361"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rim:blackberry_8100:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rim:blackberry:8100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rim:blackberry_browser:_nil_:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-1441"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "86540"
}
],
"trust": 0.3
},
"cve": "CVE-2007-1441",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2007-1441",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2007-1441",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200703-361",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-005244"
},
{
"db": "NVD",
"id": "CVE-2007-1441"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-361"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The 4thPass browser (BlackBerry Browser) on the RIM BlackBerry 8100 (Pearl) before 4.2.1 allows remote attackers to cause a denial of service (temporary functionality loss) via a long href attribute in a link in a WML page. Blackberry 8100 is prone to a denial-of-service vulnerability",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-1441"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005244"
},
{
"db": "BID",
"id": "86540"
}
],
"trust": 1.89
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2007-1441",
"trust": 2.7
},
{
"db": "SECTRACK",
"id": "1017748",
"trust": 1.9
},
{
"db": "SREASON",
"id": "2434",
"trust": 1.9
},
{
"db": "VUPEN",
"id": "ADV-2007-0945",
"trust": 1.6
},
{
"db": "OSVDB",
"id": "35030",
"trust": 1.6
},
{
"db": "CERT/CC",
"id": "VU#282856",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005244",
"trust": 0.8
},
{
"db": "BUGTRAQ",
"id": "20070312 RIM BLACKBERRY PEARL 8100 BROWSER DOS",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20070313 RE: RE: RIM BLACKBERRY PEARL 8100 BROWSER DOS",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200703-361",
"trust": 0.6
},
{
"db": "BID",
"id": "86540",
"trust": 0.3
}
],
"sources": [
{
"db": "BID",
"id": "86540"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005244"
},
{
"db": "NVD",
"id": "CVE-2007-1441"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-361"
}
]
},
"id": "VAR-200703-0571",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 1.0
},
"last_update_date": "2023-12-18T13:20:52.996000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://jp.blackberry.com/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-005244"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-005244"
},
{
"db": "NVD",
"id": "CVE-2007-1441"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "http://www.securitytracker.com/id?1017748"
},
{
"trust": 1.9,
"url": "http://securityreason.com/securityalert/2434"
},
{
"trust": 1.6,
"url": "http://osvdb.org/35030"
},
{
"trust": 1.0,
"url": "http://www.blackberry.com/btsc/articles/923/kb12577_f.sal_public.html"
},
{
"trust": 1.0,
"url": "http://www.kb.cert.org/vuls/id/282856"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/archive/1/462589/100/0/threaded"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/archive/1/462701/100/0/threaded"
},
{
"trust": 1.0,
"url": "http://www.vupen.com/english/advisories/2007/0945"
},
{
"trust": 0.9,
"url": "http://www.securityfocus.com/archive/1/archive/1/462701/100/0/threaded"
},
{
"trust": 0.9,
"url": "http://www.securityfocus.com/archive/1/archive/1/462589/100/0/threaded"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1441"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1441"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2007/0945"
}
],
"sources": [
{
"db": "BID",
"id": "86540"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005244"
},
{
"db": "NVD",
"id": "CVE-2007-1441"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-361"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "86540"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005244"
},
{
"db": "NVD",
"id": "CVE-2007-1441"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-361"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-03-13T00:00:00",
"db": "BID",
"id": "86540"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-005244"
},
{
"date": "2007-03-14T00:19:00",
"db": "NVD",
"id": "CVE-2007-1441"
},
{
"date": "2007-03-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200703-361"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-03-13T00:00:00",
"db": "BID",
"id": "86540"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-005244"
},
{
"date": "2018-10-16T16:38:31.423000",
"db": "NVD",
"id": "CVE-2007-1441"
},
{
"date": "2008-12-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200703-361"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200703-361"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "RIM BlackBerry 8100 Running on 4thPass Denial of service in browsers (DoS) Vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-005244"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200703-361"
}
],
"trust": 0.6
}
}
VAR-200706-0515
Vulnerability from variot - Updated: 2023-12-18 12:39The Research in Motion BlackBerry 7270 with 4.0 SP1 Bundle 83 allows remote attackers to cause a denial of service (blocked call reception) via a malformed SIP invite message, possibly related to multiple format string specifiers in the From field, a spoofed source IP address, and limitations of the function stack frame. BlackBerry 7270 phone is prone to a remote format-string vulnerability. An attacker can exploit this issue to cause certain features of the phone to become unusable until the phone has been reset. BlackBerry 7270 with BlackBerry Device Software 4.0.1.83 and earlier versions are vulnerable. NOTE: When exploited, the device may generate the following error message: "Uncaught exception: java.lang.IllegalArgumentException"
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200706-0515",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "blackberry software",
"scope": "eq",
"trust": 1.6,
"vendor": "rim",
"version": "4.0"
},
{
"model": "blackberry 7270",
"scope": "eq",
"trust": 1.0,
"vendor": "rim",
"version": "*"
},
{
"model": "7270",
"scope": "eq",
"trust": 0.8,
"vendor": "blackberry",
"version": "4.0 sp1 bundle 83"
},
{
"model": "blackberry 7270",
"scope": null,
"trust": 0.6,
"vendor": "rim",
"version": null
},
{
"model": "blackberry device software",
"scope": "eq",
"trust": 0.3,
"vendor": "rim",
"version": "4.0.1.83"
},
{
"model": "blackberry",
"scope": "eq",
"trust": 0.3,
"vendor": "rim",
"version": "72700"
},
{
"model": "blackberry device software",
"scope": "ne",
"trust": 0.3,
"vendor": "rim",
"version": "4.0.1.108"
}
],
"sources": [
{
"db": "BID",
"id": "24548"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005769"
},
{
"db": "NVD",
"id": "CVE-2007-3444"
},
{
"db": "CNNVD",
"id": "CNNVD-200706-438"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rim:blackberry_7270:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rim:blackberry_software:4.0:sp1_bundle83:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-3444"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Sipera VIPER Lab\u203b viper@sipera.com",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200706-438"
}
],
"trust": 0.6
},
"cve": "CVE-2007-3444",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2007-3444",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2007-3444",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200706-438",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-005769"
},
{
"db": "NVD",
"id": "CVE-2007-3444"
},
{
"db": "CNNVD",
"id": "CNNVD-200706-438"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Research in Motion BlackBerry 7270 with 4.0 SP1 Bundle 83 allows remote attackers to cause a denial of service (blocked call reception) via a malformed SIP invite message, possibly related to multiple format string specifiers in the From field, a spoofed source IP address, and limitations of the function stack frame. BlackBerry 7270 phone is prone to a remote format-string vulnerability. \nAn attacker can exploit this issue to cause certain features of the phone to become unusable until the phone has been reset. \nBlackBerry 7270 with BlackBerry Device Software 4.0.1.83 and earlier versions are vulnerable. \nNOTE: When exploited, the device may generate the following error message:\n\"Uncaught exception: java.lang.IllegalArgumentException\"",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-3444"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005769"
},
{
"db": "BID",
"id": "24548"
}
],
"trust": 1.89
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2007-3444",
"trust": 2.7
},
{
"db": "SECUNIA",
"id": "25824",
"trust": 1.6
},
{
"db": "OSVDB",
"id": "37648",
"trust": 1.6
},
{
"db": "BID",
"id": "24548",
"trust": 1.3
},
{
"db": "CERT/CC",
"id": "VU#785257",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005769",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200706-438",
"trust": 0.6
}
],
"sources": [
{
"db": "BID",
"id": "24548"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005769"
},
{
"db": "NVD",
"id": "CVE-2007-3444"
},
{
"db": "CNNVD",
"id": "CNNVD-200706-438"
}
]
},
"id": "VAR-200706-0515",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 1.0
},
"last_update_date": "2023-12-18T12:39:46.394000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://jp.blackberry.com/?did=blackberry.co.jp"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-005769"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-3444"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "http://osvdb.org/37648"
},
{
"trust": 1.6,
"url": "http://secunia.com/advisories/25824"
},
{
"trust": 1.6,
"url": "http://www.blackberry.com/btsc/articles/225/kb12700_f.sal_public.html"
},
{
"trust": 1.0,
"url": "http://www.kb.cert.org/vuls/id/785257"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/bid/24548"
},
{
"trust": 1.0,
"url": "http://www.sipera.com/index.php?action=resources%2cthreat_advisory\u0026tid=211\u0026"
},
{
"trust": 1.0,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35074"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3444"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-3444"
},
{
"trust": 0.6,
"url": "http://www.sipera.com/index.php?action=resources,threat_advisory\u0026tid=211\u0026"
},
{
"trust": 0.3,
"url": "http://www.blackberry.com"
},
{
"trust": 0.3,
"url": "http://www.sipera.com/index.php?action=resources,threat_advisory\u0026tid=208\u0026"
},
{
"trust": 0.3,
"url": "http://www.blackberry.com/btsc/search.do?cmd=displaykc\u0026doctype=kc\u0026externalid=kb12700"
}
],
"sources": [
{
"db": "BID",
"id": "24548"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005769"
},
{
"db": "NVD",
"id": "CVE-2007-3444"
},
{
"db": "CNNVD",
"id": "CNNVD-200706-438"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "24548"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005769"
},
{
"db": "NVD",
"id": "CVE-2007-3444"
},
{
"db": "CNNVD",
"id": "CNNVD-200706-438"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-03-26T00:00:00",
"db": "BID",
"id": "24548"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-005769"
},
{
"date": "2007-06-27T00:30:00",
"db": "NVD",
"id": "CVE-2007-3444"
},
{
"date": "2007-06-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200706-438"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-05-07T17:37:00",
"db": "BID",
"id": "24548"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-005769"
},
{
"date": "2023-11-07T02:00:50.217000",
"db": "NVD",
"id": "CVE-2007-3444"
},
{
"date": "2007-06-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200706-438"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200706-438"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Research in Motion BlackBerry 7270 Service disruption in (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-005769"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "format string",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200706-438"
}
],
"trust": 0.6
}
}
VAR-200706-0514
Vulnerability from variot - Updated: 2023-12-18 12:39The Research in Motion BlackBerry 7270 before 4.0 SP1 Bundle 108 does not properly manage transaction states, which allows remote attackers to cause a denial of service (temporary device hang) by sending a certain SIP INVITE message, but not providing an ACK when the call is answered. BlackBerry 7270 is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause certain features of the phone to become unusable until the phone has been reset. NOTE: The denial-of-service conditions will remain even when the phone re-registers with the Registrar. BlackBerry 7270 with BlackBerry Device Software 4.0.1.83 and prior versions are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200706-0514",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "blackberry 7270",
"scope": "lte",
"trust": 1.0,
"vendor": "research in motion",
"version": "4.0_sp1_bundle_83"
},
{
"model": "7270",
"scope": "lt",
"trust": 0.8,
"vendor": "blackberry",
"version": "4.0 sp1 bundle 108"
},
{
"model": "blackberry 7270",
"scope": "eq",
"trust": 0.6,
"vendor": "research in motion",
"version": "4.0_sp1_bundle_83"
},
{
"model": "blackberry device software",
"scope": "eq",
"trust": 0.3,
"vendor": "rim",
"version": "4.0.1.83"
},
{
"model": "blackberry",
"scope": "eq",
"trust": 0.3,
"vendor": "rim",
"version": "72700"
},
{
"model": "blackberry device software",
"scope": "ne",
"trust": 0.3,
"vendor": "rim",
"version": "4.0.1.108"
}
],
"sources": [
{
"db": "BID",
"id": "24545"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005768"
},
{
"db": "NVD",
"id": "CVE-2007-3443"
},
{
"db": "CNNVD",
"id": "CNNVD-200706-419"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:research_in_motion_limited:blackberry_7270:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0_sp1_bundle_83",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-3443"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Sipera VIPER Lab is credited with the discovery of this vulnerability.",
"sources": [
{
"db": "BID",
"id": "24545"
}
],
"trust": 0.3
},
"cve": "CVE-2007-3443",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 2.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 4.4,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Adjacent Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 2.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2007-3443",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Low",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2007-3443",
"trust": 1.8,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-200706-419",
"trust": 0.6,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-005768"
},
{
"db": "NVD",
"id": "CVE-2007-3443"
},
{
"db": "CNNVD",
"id": "CNNVD-200706-419"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Research in Motion BlackBerry 7270 before 4.0 SP1 Bundle 108 does not properly manage transaction states, which allows remote attackers to cause a denial of service (temporary device hang) by sending a certain SIP INVITE message, but not providing an ACK when the call is answered. BlackBerry 7270 is prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause certain features of the phone to become unusable until the phone has been reset. \nNOTE: The denial-of-service conditions will remain even when the phone re-registers with the Registrar. \nBlackBerry 7270 with BlackBerry Device Software 4.0.1.83 and prior versions are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-3443"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005768"
},
{
"db": "BID",
"id": "24545"
}
],
"trust": 1.89
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2007-3443",
"trust": 2.7
},
{
"db": "OSVDB",
"id": "37647",
"trust": 1.6
},
{
"db": "SECUNIA",
"id": "25824",
"trust": 1.6
},
{
"db": "BID",
"id": "24545",
"trust": 1.3
},
{
"db": "CERT/CC",
"id": "VU#324841",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005768",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200706-419",
"trust": 0.6
}
],
"sources": [
{
"db": "BID",
"id": "24545"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005768"
},
{
"db": "NVD",
"id": "CVE-2007-3443"
},
{
"db": "CNNVD",
"id": "CNNVD-200706-419"
}
]
},
"id": "VAR-200706-0514",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 1.0
},
"last_update_date": "2023-12-18T12:39:46.419000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://jp.blackberry.com/?did=blackberry.co.jp"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-005768"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-3443"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "http://osvdb.org/37647"
},
{
"trust": 1.6,
"url": "http://secunia.com/advisories/25824"
},
{
"trust": 1.6,
"url": "http://www.blackberry.com/btsc/articles/220/kb12705_f.sal_public.html"
},
{
"trust": 1.0,
"url": "http://www.kb.cert.org/vuls/id/324841"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/bid/24545"
},
{
"trust": 1.0,
"url": "http://www.sipera.com/index.php?action=resources%2cthreat_advisory\u0026tid=213\u0026"
},
{
"trust": 1.0,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35075"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3443"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-3443"
},
{
"trust": 0.6,
"url": "http://www.sipera.com/index.php?action=resources,threat_advisory\u0026tid=213\u0026"
},
{
"trust": 0.3,
"url": "http://www.blackberry.com"
},
{
"trust": 0.3,
"url": "http://www.blackberry.com/btsc/search.do?cmd=displaykc\u0026doctype=kc\u0026externalid=kb12705"
},
{
"trust": 0.3,
"url": "http://www.sipera.com/index.php?action=resources,threat_advisory\u0026tid=211\u0026"
}
],
"sources": [
{
"db": "BID",
"id": "24545"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005768"
},
{
"db": "NVD",
"id": "CVE-2007-3443"
},
{
"db": "CNNVD",
"id": "CNNVD-200706-419"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "24545"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-005768"
},
{
"db": "NVD",
"id": "CVE-2007-3443"
},
{
"db": "CNNVD",
"id": "CNNVD-200706-419"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-03-26T00:00:00",
"db": "BID",
"id": "24545"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-005768"
},
{
"date": "2007-06-27T00:30:00",
"db": "NVD",
"id": "CVE-2007-3443"
},
{
"date": "2007-06-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200706-419"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-05-07T17:37:00",
"db": "BID",
"id": "24545"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-005768"
},
{
"date": "2023-11-07T02:00:50.167000",
"db": "NVD",
"id": "CVE-2007-3443"
},
{
"date": "2007-06-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200706-419"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "specific network environment",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200706-419"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Research in Motion BlackBerry 7270 Service disruption in (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-005768"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "unknown",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200706-419"
}
],
"trust": 0.6
}
}
VAR-201007-0359
Vulnerability from variot - Updated: 2022-05-17 02:09The BlackBerry 9700 is a popular smart platform phone. The BlackBerry 9700 WEB service has an unspecified security vulnerability that allows a remote attacker to crash a web application. No detailed vulnerability details are currently available. An attacker can exploit this issue to crash the browser on the affected device, denying service to legitimate users
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201007-0359",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": null,
"scope": null,
"trust": 0.6,
"vendor": "no",
"version": null
},
{
"model": "blackberry",
"scope": "eq",
"trust": 0.3,
"vendor": "rim",
"version": "9700"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-1250"
},
{
"db": "BID",
"id": "41375"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Laurent Oudot of TEHTRI-Security",
"sources": [
{
"db": "BID",
"id": "41375"
}
],
"trust": 0.3
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The BlackBerry 9700 is a popular smart platform phone. The BlackBerry 9700 WEB service has an unspecified security vulnerability that allows a remote attacker to crash a web application. No detailed vulnerability details are currently available. \nAn attacker can exploit this issue to crash the browser on the affected device, denying service to legitimate users",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-1250"
},
{
"db": "BID",
"id": "41375"
}
],
"trust": 0.81
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "41375",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2010-1250",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-1250"
},
{
"db": "BID",
"id": "41375"
}
]
},
"id": "VAR-201007-0359",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-1250"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-1250"
}
]
},
"last_update_date": "2022-05-17T02:09:17.385000Z",
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/512160"
},
{
"trust": 0.3,
"url": "http://www.blackberry.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-1250"
},
{
"db": "BID",
"id": "41375"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2010-1250"
},
{
"db": "BID",
"id": "41375"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-07-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2010-1250"
},
{
"date": "2010-07-05T00:00:00",
"db": "BID",
"id": "41375"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-07-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2010-1250"
},
{
"date": "2010-07-05T00:00:00",
"db": "BID",
"id": "41375"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "41375"
}
],
"trust": 0.3
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "BlackBerry 9700 WEB Browser Unknown Remote Denial of Service Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-1250"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "41375"
}
],
"trust": 0.3
}
}
VAR-201501-0783
Vulnerability from variot - Updated: 2022-05-17 02:01BlackBerry is a mobile phone that supports basic functions such as multiple mail systems, multiple format attachments, mail filtering, and remote clearing of email data. Multiple BlackBerry products have security vulnerabilities that allow local attackers to bypass security restrictions, perform unauthorized operations, etc. through the USB port
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201501-0783",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "blackberry",
"scope": null,
"trust": 0.6,
"vendor": "blackberry",
"version": null
},
{
"model": "blackberry",
"scope": "eq",
"trust": 0.3,
"vendor": "rim",
"version": "7.1"
},
{
"model": "torch",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "9860"
},
{
"model": "torch",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "9850"
},
{
"model": "torch",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "9810"
},
{
"model": "style",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "9670"
},
{
"model": "storm2",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "9550"
},
{
"model": "storm",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "9530"
},
{
"model": "storm",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "9500"
},
{
"model": "pearl flip",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "8230"
},
{
"model": "pearl",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "8230"
},
{
"model": "pearl 8130m",
"scope": null,
"trust": 0.3,
"vendor": "blackberry",
"version": null
},
{
"model": "curve",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "9370"
},
{
"model": "curve",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "9350"
},
{
"model": "curve",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "9330"
},
{
"model": "curve",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "9310"
},
{
"model": "curve",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "8530"
},
{
"model": "bold",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "9930"
},
{
"model": "bold",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "9900"
},
{
"model": "bold",
"scope": "eq",
"trust": 0.3,
"vendor": "blackberry",
"version": "9650"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-00290"
},
{
"db": "BID",
"id": "71893"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "71893"
}
],
"trust": 0.3
},
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.4,
"id": "CNVD-2015-00290",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "CNVD",
"id": "CNVD-2015-00290",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-00290"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "BlackBerry is a mobile phone that supports basic functions such as multiple mail systems, multiple format attachments, mail filtering, and remote clearing of email data. Multiple BlackBerry products have security vulnerabilities that allow local attackers to bypass security restrictions, perform unauthorized operations, etc. through the USB port",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-00290"
},
{
"db": "BID",
"id": "71893"
}
],
"trust": 0.81
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "71893",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2015-00290",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-00290"
},
{
"db": "BID",
"id": "71893"
}
]
},
"id": "VAR-201501-0783",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-00290"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-00290"
}
]
},
"last_update_date": "2022-05-17T02:01:11.173000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patches for local security bypass vulnerabilities in multiple BlackBerry products",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/53934"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-00290"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/71893/"
},
{
"trust": 0.3,
"url": "http://us.blackberry.com/"
},
{
"trust": 0.3,
"url": "http://btsc.webapps.blackberry.com/btsc/viewdocument.do;jsessionid=ffee88c44e68b677713a75741a6988b8?nocount=true\u0026externalid=kb36557\u0026sliceid=1\u0026cmd=\u0026forward=nonthreadedkc\u0026command=show\u0026kcid=kb36557\u0026viewe"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-00290"
},
{
"db": "BID",
"id": "71893"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-00290"
},
{
"db": "BID",
"id": "71893"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-01-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-00290"
},
{
"date": "2014-12-26T00:00:00",
"db": "BID",
"id": "71893"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-01-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-00290"
},
{
"date": "2014-12-26T00:00:00",
"db": "BID",
"id": "71893"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "71893"
}
],
"trust": 0.3
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple BlackBerry Products Local Security Bypass Vulnerabilities",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-00290"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "71893"
}
],
"trust": 0.3
}
}
FKIE_CVE-2007-1441
Vulnerability from fkie_nvd - Published: 2007-03-14 00:19 - Updated: 2025-04-09 00:30| Vendor | Product | Version | |
|---|---|---|---|
| rim | blackberry_8100 | * | |
| rim | blackberry | 8100 | |
| rim | blackberry_browser | _nil_ |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rim:blackberry_8100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D65EE879-57A7-471C-A58B-05632E86CFDA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rim:blackberry:8100:*:*:*:*:*:*:*",
"matchCriteriaId": "BF328C6A-1E67-4E3E-9908-F15068216341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry_browser:_nil_:*:*:*:*:*:*:*",
"matchCriteriaId": "B8F0CA2B-83CB-4A2A-A41C-9B285FB07892",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The 4thPass browser (BlackBerry Browser) on the RIM BlackBerry 8100 (Pearl) before 4.2.1 allows remote attackers to cause a denial of service (temporary functionality loss) via a long href attribute in a link in a WML page."
},
{
"lang": "es",
"value": "El navegador 4thPass (Navegador BlackBerry) en el BlackBerry 8100 (Pearl) anterior a 4.2.1 de RIM, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (p\u00e9rdida de funcionalidad temporal) por medio de un atributo href largo en un enlace en una p\u00e1gina WML."
}
],
"id": "CVE-2007-1441",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2007-03-14T00:19:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/35030"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/2434"
},
{
"source": "cve@mitre.org",
"url": "http://www.blackberry.com/btsc/articles/923/KB12577_f.SAL_Public.html"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/282856"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/462589/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/462701/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1017748"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/0945"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/35030"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/2434"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.blackberry.com/btsc/articles/923/KB12577_f.SAL_Public.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/282856"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/462589/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/462701/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1017748"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/0945"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-2343
Vulnerability from fkie_nvd - Published: 2005-12-31 05:00 - Updated: 2025-04-03 01:03| Vendor | Product | Version | |
|---|---|---|---|
| rim | blackberry_desktop_manager | 4.0 | |
| rim | blackberry_device_software | 4.0 | |
| rim | blackberry | 7100g | |
| rim | blackberry | 7100i | |
| rim | blackberry | 7100r | |
| rim | blackberry | 7100t | |
| rim | blackberry | 7100v | |
| rim | blackberry | 7100x | |
| rim | blackberry | 7105t | |
| rim | blackberry | 7130e | |
| rim | blackberry | 7230_3.7.1_.41 | |
| rim | blackberry | 7230_3.8 | |
| rim | blackberry | 7230_4.0 | |
| rim | blackberry | 7250 | |
| rim | blackberry | 7280 | |
| rim | blackberry | 7290 | |
| rim | blackberry | 7520 | |
| rim | blackberry | 7730 | |
| rim | blackberry | 7750 | |
| rim | blackberry | 7780 | |
| rim | blackberry | 8700c | |
| rim | blackberry | 8700f | |
| rim | blackberry | 8700r |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rim:blackberry_desktop_manager:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D9477C1A-2072-4362-BD67-27C721E7E805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry_device_software:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "500A2D65-7220-4252-856F-052EA40EFB12",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rim:blackberry:7100g:*:*:*:*:*:*:*",
"matchCriteriaId": "EE6C1404-8B96-460C-9060-04C402E23AF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7100i:*:*:*:*:*:*:*",
"matchCriteriaId": "E08E215F-7EF3-4012-8D14-689EE1550A67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7100r:*:*:*:*:*:*:*",
"matchCriteriaId": "67CD32AF-AB92-4215-9062-BB3E97444518",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7100t:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE29076-C3FD-475A-AE95-41E78596AC75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7100v:*:*:*:*:*:*:*",
"matchCriteriaId": "FD365609-508D-4501-86DB-2D510F0F1071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7100x:*:*:*:*:*:*:*",
"matchCriteriaId": "6142B7E1-002A-4BA5-A062-2614029FCA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7105t:*:*:*:*:*:*:*",
"matchCriteriaId": "AFBCA036-2636-451D-A03F-20D4B2837D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7130e:*:*:*:*:*:*:*",
"matchCriteriaId": "EBA64687-7D57-4630-A948-A4C510164AEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7230_3.7.1_.41:*:*:*:*:*:*:*",
"matchCriteriaId": "3AC44A87-CE11-48F8-BBF1-7971784D4A43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7230_3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C7FE590B-9A8A-4839-91F9-941B192EA2C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7230_4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B5080187-373E-47FE-9970-30049690E632",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7250:*:*:*:*:*:*:*",
"matchCriteriaId": "49E4214E-8D31-4E0C-8266-89D228605A13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7280:*:*:*:*:*:*:*",
"matchCriteriaId": "5038858C-709E-4C0D-80A9-41E8A3D07633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7290:*:*:*:*:*:*:*",
"matchCriteriaId": "4F290329-09CC-40C8-A928-CD66841B68D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7520:*:*:*:*:*:*:*",
"matchCriteriaId": "E8485224-909C-440C-93BB-B059E89CBB87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7730:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD18A44-5A92-41DF-B67E-A4EF010BCE2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7750:*:*:*:*:*:*:*",
"matchCriteriaId": "AD5FCD19-F244-4E53-A843-AF4D053C3680",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:7780:*:*:*:*:*:*:*",
"matchCriteriaId": "30142764-C686-432F-BFA4-F7D42C232CE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:8700c:*:*:*:*:*:*:*",
"matchCriteriaId": "24DC35A6-D335-4968-81AD-5A4FE982F550",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:8700f:*:*:*:*:*:*:*",
"matchCriteriaId": "8D7A8585-EE80-46F4-95A6-229A0A34D3BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rim:blackberry:8700r:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC877CE-41BC-49CF-9381-209EA4222AEE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Research in Motion (RIM) BlackBerry Handheld web browser for BlackBerry Handheld before 4.0.2 allows remote attackers to cause a denial of service (hang) via a Java Application Description (JAD) file with a long application name and vendor string, which prevents a browser dialog from being properly dismissed."
}
],
"id": "CVE-2005-2343",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2005-12-31T05:00:00.000",
"references": [
{
"source": "cret@cert.org",
"url": "http://securitytracker.com/id?1015428"
},
{
"source": "cret@cert.org",
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/?nodeid=1167791"
},
{
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/829400"
},
{
"source": "cret@cert.org",
"url": "http://www.securityfocus.com/bid/16099"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2006/0011"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1015428"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/?nodeid=1167791"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/829400"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/16099"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/0011"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2004-1597
Vulnerability from fkie_nvd - Published: 2004-10-13 04:00 - Updated: 2025-04-03 01:03| Vendor | Product | Version | |
|---|---|---|---|
| rim | blackberry | 7230_3.7.1_.41 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rim:blackberry:7230_3.7.1_.41:*:*:*:*:*:*:*",
"matchCriteriaId": "3AC44A87-CE11-48F8-BBF1-7971784D4A43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RIM Blackberry 7230 running RIM Blackberry OS 3.7 SP1 allows remote attackers to cause a denial of service (device reboot and possibly data corruption) via a calendar message with a long Location field, which triggers a watchdog while the message is being stored."
}
],
"id": "CVE-2004-1597",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-10-13T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027487.html"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=109769022430842\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=109778267829493\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/12814"
},
{
"source": "cve@mitre.org",
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/Known_%20Issues_-_HexView_advisory_on_BlackBerry_buffer_overflow%2C_DoS%2C_and_data_loss.html?nodeid=737173\u0026vernum=0"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.hexview.com/docs/20041012-1.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/11389"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17700"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027487.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=109769022430842\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=109778267829493\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/12814"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/Known_%20Issues_-_HexView_advisory_on_BlackBerry_buffer_overflow%2C_DoS%2C_and_data_loss.html?nodeid=737173\u0026vernum=0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.hexview.com/docs/20041012-1.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/11389"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17700"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2007-1441 (GCVE-0-2007-1441)
Vulnerability from cvelistv5 – Published: 2007-03-14 00:00 – Updated: 2024-08-07 12:59- n/a
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:59:08.440Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-0945",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0945"
},
{
"name": "35030",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/35030"
},
{
"name": "20070312 RIM BlackBerry Pearl 8100 Browser DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/462589/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.blackberry.com/btsc/articles/923/KB12577_f.SAL_Public.html"
},
{
"name": "1017748",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017748"
},
{
"name": "2434",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/2434"
},
{
"name": "20070313 Re: Re: RIM BlackBerry Pearl 8100 Browser DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/462701/100/0/threaded"
},
{
"name": "VU#282856",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/282856"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The 4thPass browser (BlackBerry Browser) on the RIM BlackBerry 8100 (Pearl) before 4.2.1 allows remote attackers to cause a denial of service (temporary functionality loss) via a long href attribute in a link in a WML page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-0945",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0945"
},
{
"name": "35030",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/35030"
},
{
"name": "20070312 RIM BlackBerry Pearl 8100 Browser DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/462589/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.blackberry.com/btsc/articles/923/KB12577_f.SAL_Public.html"
},
{
"name": "1017748",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017748"
},
{
"name": "2434",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/2434"
},
{
"name": "20070313 Re: Re: RIM BlackBerry Pearl 8100 Browser DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/462701/100/0/threaded"
},
{
"name": "VU#282856",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/282856"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1441",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The 4thPass browser (BlackBerry Browser) on the RIM BlackBerry 8100 (Pearl) before 4.2.1 allows remote attackers to cause a denial of service (temporary functionality loss) via a long href attribute in a link in a WML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-0945",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0945"
},
{
"name": "35030",
"refsource": "OSVDB",
"url": "http://osvdb.org/35030"
},
{
"name": "20070312 RIM BlackBerry Pearl 8100 Browser DoS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/462589/100/0/threaded"
},
{
"name": "http://www.blackberry.com/btsc/articles/923/KB12577_f.SAL_Public.html",
"refsource": "CONFIRM",
"url": "http://www.blackberry.com/btsc/articles/923/KB12577_f.SAL_Public.html"
},
{
"name": "1017748",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017748"
},
{
"name": "2434",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2434"
},
{
"name": "20070313 Re: Re: RIM BlackBerry Pearl 8100 Browser DoS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/462701/100/0/threaded"
},
{
"name": "VU#282856",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/282856"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1441",
"datePublished": "2007-03-14T00:00:00",
"dateReserved": "2007-03-13T00:00:00",
"dateUpdated": "2024-08-07T12:59:08.440Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-2343 (GCVE-0-2005-2343)
Vulnerability from cvelistv5 – Published: 2006-01-02 00:00 – Updated: 2024-08-07 22:22- n/a
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:22:49.063Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/?nodeid=1167791"
},
{
"name": "VU#829400",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/829400"
},
{
"name": "ADV-2006-0011",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/0011"
},
{
"name": "16099",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16099"
},
{
"name": "1015428",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015428"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Research in Motion (RIM) BlackBerry Handheld web browser for BlackBerry Handheld before 4.0.2 allows remote attackers to cause a denial of service (hang) via a Java Application Description (JAD) file with a long application name and vendor string, which prevents a browser dialog from being properly dismissed."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2006-01-04T10:00:00",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/?nodeid=1167791"
},
{
"name": "VU#829400",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/829400"
},
{
"name": "ADV-2006-0011",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/0011"
},
{
"name": "16099",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16099"
},
{
"name": "1015428",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015428"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2005-2343",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Research in Motion (RIM) BlackBerry Handheld web browser for BlackBerry Handheld before 4.0.2 allows remote attackers to cause a denial of service (hang) via a Java Application Description (JAD) file with a long application name and vendor string, which prevents a browser dialog from being properly dismissed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/?nodeid=1167791",
"refsource": "CONFIRM",
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/?nodeid=1167791"
},
{
"name": "VU#829400",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/829400"
},
{
"name": "ADV-2006-0011",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0011"
},
{
"name": "16099",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16099"
},
{
"name": "1015428",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015428"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2005-2343",
"datePublished": "2006-01-02T00:00:00",
"dateReserved": "2005-07-21T00:00:00",
"dateUpdated": "2024-08-07T22:22:49.063Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-1597 (GCVE-0-2004-1597)
Vulnerability from cvelistv5 – Published: 2005-02-20 05:00 – Updated: 2024-08-08 01:00- n/a
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:00:37.139Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20041012 [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027487.html"
},
{
"name": "12814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/12814"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/Known_%20Issues_-_HexView_advisory_on_BlackBerry_buffer_overflow%2C_DoS%2C_and_data_loss.html?nodeid=737173\u0026vernum=0"
},
{
"name": "20041014 [HV-MED] UPDATE: RIM Blackberry DoS, data loss",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=109778267829493\u0026w=2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.hexview.com/docs/20041012-1.txt"
},
{
"name": "20041013 [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=109769022430842\u0026w=2"
},
{
"name": "11389",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/11389"
},
{
"name": "blackberry-calendar-bo(17700)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17700"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-10-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "RIM Blackberry 7230 running RIM Blackberry OS 3.7 SP1 allows remote attackers to cause a denial of service (device reboot and possibly data corruption) via a calendar message with a long Location field, which triggers a watchdog while the message is being stored."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20041012 [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027487.html"
},
{
"name": "12814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/12814"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/Known_%20Issues_-_HexView_advisory_on_BlackBerry_buffer_overflow%2C_DoS%2C_and_data_loss.html?nodeid=737173\u0026vernum=0"
},
{
"name": "20041014 [HV-MED] UPDATE: RIM Blackberry DoS, data loss",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=109778267829493\u0026w=2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.hexview.com/docs/20041012-1.txt"
},
{
"name": "20041013 [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=109769022430842\u0026w=2"
},
{
"name": "11389",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/11389"
},
{
"name": "blackberry-calendar-bo(17700)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17700"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-1597",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "RIM Blackberry 7230 running RIM Blackberry OS 3.7 SP1 allows remote attackers to cause a denial of service (device reboot and possibly data corruption) via a calendar message with a long Location field, which triggers a watchdog while the message is being stored."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20041012 [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027487.html"
},
{
"name": "12814",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/12814"
},
{
"name": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/Known_%20Issues_-_HexView_advisory_on_BlackBerry_buffer_overflow,_DoS,_and_data_loss.html?nodeid=737173\u0026vernum=0",
"refsource": "CONFIRM",
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/Known_%20Issues_-_HexView_advisory_on_BlackBerry_buffer_overflow,_DoS,_and_data_loss.html?nodeid=737173\u0026vernum=0"
},
{
"name": "20041014 [HV-MED] UPDATE: RIM Blackberry DoS, data loss",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=109778267829493\u0026w=2"
},
{
"name": "http://www.hexview.com/docs/20041012-1.txt",
"refsource": "MISC",
"url": "http://www.hexview.com/docs/20041012-1.txt"
},
{
"name": "20041013 [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=109769022430842\u0026w=2"
},
{
"name": "11389",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11389"
},
{
"name": "blackberry-calendar-bo(17700)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17700"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-1597",
"datePublished": "2005-02-20T05:00:00",
"dateReserved": "2005-02-20T00:00:00",
"dateUpdated": "2024-08-08T01:00:37.139Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-1441 (GCVE-0-2007-1441)
Vulnerability from nvd – Published: 2007-03-14 00:00 – Updated: 2024-08-07 12:59- n/a
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:59:08.440Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-0945",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0945"
},
{
"name": "35030",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/35030"
},
{
"name": "20070312 RIM BlackBerry Pearl 8100 Browser DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/462589/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.blackberry.com/btsc/articles/923/KB12577_f.SAL_Public.html"
},
{
"name": "1017748",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017748"
},
{
"name": "2434",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/2434"
},
{
"name": "20070313 Re: Re: RIM BlackBerry Pearl 8100 Browser DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/462701/100/0/threaded"
},
{
"name": "VU#282856",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/282856"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The 4thPass browser (BlackBerry Browser) on the RIM BlackBerry 8100 (Pearl) before 4.2.1 allows remote attackers to cause a denial of service (temporary functionality loss) via a long href attribute in a link in a WML page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-0945",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0945"
},
{
"name": "35030",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/35030"
},
{
"name": "20070312 RIM BlackBerry Pearl 8100 Browser DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/462589/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.blackberry.com/btsc/articles/923/KB12577_f.SAL_Public.html"
},
{
"name": "1017748",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017748"
},
{
"name": "2434",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/2434"
},
{
"name": "20070313 Re: Re: RIM BlackBerry Pearl 8100 Browser DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/462701/100/0/threaded"
},
{
"name": "VU#282856",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/282856"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1441",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The 4thPass browser (BlackBerry Browser) on the RIM BlackBerry 8100 (Pearl) before 4.2.1 allows remote attackers to cause a denial of service (temporary functionality loss) via a long href attribute in a link in a WML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-0945",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0945"
},
{
"name": "35030",
"refsource": "OSVDB",
"url": "http://osvdb.org/35030"
},
{
"name": "20070312 RIM BlackBerry Pearl 8100 Browser DoS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/462589/100/0/threaded"
},
{
"name": "http://www.blackberry.com/btsc/articles/923/KB12577_f.SAL_Public.html",
"refsource": "CONFIRM",
"url": "http://www.blackberry.com/btsc/articles/923/KB12577_f.SAL_Public.html"
},
{
"name": "1017748",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017748"
},
{
"name": "2434",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2434"
},
{
"name": "20070313 Re: Re: RIM BlackBerry Pearl 8100 Browser DoS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/462701/100/0/threaded"
},
{
"name": "VU#282856",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/282856"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1441",
"datePublished": "2007-03-14T00:00:00",
"dateReserved": "2007-03-13T00:00:00",
"dateUpdated": "2024-08-07T12:59:08.440Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-2343 (GCVE-0-2005-2343)
Vulnerability from nvd – Published: 2006-01-02 00:00 – Updated: 2024-08-07 22:22- n/a
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:22:49.063Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/?nodeid=1167791"
},
{
"name": "VU#829400",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/829400"
},
{
"name": "ADV-2006-0011",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/0011"
},
{
"name": "16099",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16099"
},
{
"name": "1015428",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015428"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Research in Motion (RIM) BlackBerry Handheld web browser for BlackBerry Handheld before 4.0.2 allows remote attackers to cause a denial of service (hang) via a Java Application Description (JAD) file with a long application name and vendor string, which prevents a browser dialog from being properly dismissed."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2006-01-04T10:00:00",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/?nodeid=1167791"
},
{
"name": "VU#829400",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/829400"
},
{
"name": "ADV-2006-0011",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/0011"
},
{
"name": "16099",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16099"
},
{
"name": "1015428",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015428"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2005-2343",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Research in Motion (RIM) BlackBerry Handheld web browser for BlackBerry Handheld before 4.0.2 allows remote attackers to cause a denial of service (hang) via a Java Application Description (JAD) file with a long application name and vendor string, which prevents a browser dialog from being properly dismissed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/?nodeid=1167791",
"refsource": "CONFIRM",
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/?nodeid=1167791"
},
{
"name": "VU#829400",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/829400"
},
{
"name": "ADV-2006-0011",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0011"
},
{
"name": "16099",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16099"
},
{
"name": "1015428",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015428"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2005-2343",
"datePublished": "2006-01-02T00:00:00",
"dateReserved": "2005-07-21T00:00:00",
"dateUpdated": "2024-08-07T22:22:49.063Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-1597 (GCVE-0-2004-1597)
Vulnerability from nvd – Published: 2005-02-20 05:00 – Updated: 2024-08-08 01:00- n/a
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:00:37.139Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20041012 [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027487.html"
},
{
"name": "12814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/12814"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/Known_%20Issues_-_HexView_advisory_on_BlackBerry_buffer_overflow%2C_DoS%2C_and_data_loss.html?nodeid=737173\u0026vernum=0"
},
{
"name": "20041014 [HV-MED] UPDATE: RIM Blackberry DoS, data loss",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=109778267829493\u0026w=2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.hexview.com/docs/20041012-1.txt"
},
{
"name": "20041013 [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=109769022430842\u0026w=2"
},
{
"name": "11389",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/11389"
},
{
"name": "blackberry-calendar-bo(17700)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17700"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-10-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "RIM Blackberry 7230 running RIM Blackberry OS 3.7 SP1 allows remote attackers to cause a denial of service (device reboot and possibly data corruption) via a calendar message with a long Location field, which triggers a watchdog while the message is being stored."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20041012 [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027487.html"
},
{
"name": "12814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/12814"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/Known_%20Issues_-_HexView_advisory_on_BlackBerry_buffer_overflow%2C_DoS%2C_and_data_loss.html?nodeid=737173\u0026vernum=0"
},
{
"name": "20041014 [HV-MED] UPDATE: RIM Blackberry DoS, data loss",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=109778267829493\u0026w=2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.hexview.com/docs/20041012-1.txt"
},
{
"name": "20041013 [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=109769022430842\u0026w=2"
},
{
"name": "11389",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/11389"
},
{
"name": "blackberry-calendar-bo(17700)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17700"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-1597",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "RIM Blackberry 7230 running RIM Blackberry OS 3.7 SP1 allows remote attackers to cause a denial of service (device reboot and possibly data corruption) via a calendar message with a long Location field, which triggers a watchdog while the message is being stored."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20041012 [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027487.html"
},
{
"name": "12814",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/12814"
},
{
"name": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/Known_%20Issues_-_HexView_advisory_on_BlackBerry_buffer_overflow,_DoS,_and_data_loss.html?nodeid=737173\u0026vernum=0",
"refsource": "CONFIRM",
"url": "http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/Known_%20Issues_-_HexView_advisory_on_BlackBerry_buffer_overflow,_DoS,_and_data_loss.html?nodeid=737173\u0026vernum=0"
},
{
"name": "20041014 [HV-MED] UPDATE: RIM Blackberry DoS, data loss",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=109778267829493\u0026w=2"
},
{
"name": "http://www.hexview.com/docs/20041012-1.txt",
"refsource": "MISC",
"url": "http://www.hexview.com/docs/20041012-1.txt"
},
{
"name": "20041013 [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=109769022430842\u0026w=2"
},
{
"name": "11389",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11389"
},
{
"name": "blackberry-calendar-bo(17700)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17700"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-1597",
"datePublished": "2005-02-20T05:00:00",
"dateReserved": "2005-02-20T00:00:00",
"dateUpdated": "2024-08-08T01:00:37.139Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}