Search criteria
4 vulnerabilities found for fritzbox by avm
VAR-200701-0211
Vulnerability from variot - Updated: 2023-12-18 13:15AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060). FRITZ!Box is prone to a remote denial-of-service vulnerability. A remote attacker can exploit this issue to crash the VoIP-telephony service, effectively denying service to legitimate users.
Secunia is proud to announce the availability of the Secunia Software Inspector.
The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor.
Try it out online: http://secunia.com/software_inspector/
TITLE: Fritz!Box UDP Packet SIP Denial of Service
SECUNIA ADVISORY ID: SA23868
VERIFY ADVISORY: http://secunia.com/advisories/23868/
CRITICAL: Moderately critical
IMPACT: DoS
WHERE:
From remote
OPERATING SYSTEM: AVM Fritz!Box 7050 http://secunia.com/product/13298/
DESCRIPTION: Matthias Wenzel has reported a vulnerability in AVM Fritz!Box 7050, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error within the handling of certain UDP packets.
SOLUTION: Use another device.
PROVIDED AND/OR DISCOVERED BY: Matthias Wenzel
ORIGINAL ADVISORY: http://mazzoo.de/blog/2007/01/18#FritzBox_DoS
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200701-0211",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "fritzbox",
"scope": "eq",
"trust": 1.6,
"vendor": "avm",
"version": "7050"
},
{
"model": "fritz!box",
"scope": null,
"trust": 0.8,
"vendor": "avm",
"version": null
},
{
"model": "fritz!box",
"scope": "eq",
"trust": 0.3,
"vendor": "avm",
"version": "7050"
},
{
"model": "fritz!box",
"scope": "ne",
"trust": 0.3,
"vendor": "avm",
"version": "705014.4.2"
}
],
"sources": [
{
"db": "BID",
"id": "22130"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-001431"
},
{
"db": "NVD",
"id": "CVE-2007-0431"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-379"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:avm:fritzbox:7050:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-0431"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Matthias Wenzel",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200701-379"
}
],
"trust": 0.6
},
"cve": "CVE-2007-0431",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2007-0431",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2007-0431",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-200701-379",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-001431"
},
{
"db": "NVD",
"id": "CVE-2007-0431"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-379"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060). FRITZ!Box is prone to a remote denial-of-service vulnerability. \nA remote attacker can exploit this issue to crash the VoIP-telephony service, effectively denying service to legitimate users. \n\n----------------------------------------------------------------------\n\nSecunia is proud to announce the availability of the Secunia Software\nInspector. \n\nThe Secunia Software Inspector is a free service that detects insecure\nversions of software that you may have installed in your system. When\ninsecure versions are detected, the Secunia Software Inspector also\nprovides thorough guidelines for updating the software to the latest\nsecure version from the vendor. \n\nTry it out online:\nhttp://secunia.com/software_inspector/\n\n----------------------------------------------------------------------\n\nTITLE:\nFritz!Box UDP Packet SIP Denial of Service\n\nSECUNIA ADVISORY ID:\nSA23868\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/23868/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nAVM Fritz!Box 7050\nhttp://secunia.com/product/13298/\n\nDESCRIPTION:\nMatthias Wenzel has reported a vulnerability in AVM Fritz!Box 7050,\nwhich can be exploited by malicious people to cause a DoS (Denial of\nService). \n\nThe vulnerability is caused due to an error within the handling of\ncertain UDP packets. \n\nSOLUTION:\nUse another device. \n\nPROVIDED AND/OR DISCOVERED BY:\nMatthias Wenzel\n\nORIGINAL ADVISORY:\nhttp://mazzoo.de/blog/2007/01/18#FritzBox_DoS\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-0431"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-001431"
},
{
"db": "BID",
"id": "22130"
},
{
"db": "PACKETSTORM",
"id": "53817"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2007-0431",
"trust": 2.4
},
{
"db": "BID",
"id": "22130",
"trust": 1.9
},
{
"db": "SECUNIA",
"id": "23868",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "32940",
"trust": 1.6
},
{
"db": "VUPEN",
"id": "ADV-2007-0272",
"trust": 1.6
},
{
"db": "JVNDB",
"id": "JVNDB-2007-001431",
"trust": 0.8
},
{
"db": "XF",
"id": "31633",
"trust": 0.6
},
{
"db": "FULLDISC",
"id": "20070119 DOS AGAINST AVM FRITZ!BOX 7050 (AND OTHERS)",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20070119 DOS AGAINST AVM FRITZ!BOX 7050 (AND OTHERS)",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20070123 RE: DOS AGAINST AVM FRITZ!BOX 7050 (AND OTHERS)",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200701-379",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "53817",
"trust": 0.1
}
],
"sources": [
{
"db": "BID",
"id": "22130"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-001431"
},
{
"db": "PACKETSTORM",
"id": "53817"
},
{
"db": "NVD",
"id": "CVE-2007-0431"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-379"
}
]
},
"id": "VAR-200701-0211",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.4861111
},
"last_update_date": "2023-12-18T13:15:49.795000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.avm.de/en/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-001431"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-0431"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "http://mazzoo.de/blog/2007/01/18#fritzbox_dos"
},
{
"trust": 1.6,
"url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
},
{
"trust": 1.6,
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
},
{
"trust": 1.6,
"url": "http://osvdb.org/32940"
},
{
"trust": 1.6,
"url": "http://secunia.com/advisories/23868"
},
{
"trust": 1.6,
"url": "http://www.securityfocus.com/bid/22130"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
},
{
"trust": 1.0,
"url": "http://www.vupen.com/english/advisories/2007/0272"
},
{
"trust": 1.0,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0431"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0431"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/457406/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/31633"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/457829/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2007/0272"
},
{
"trust": 0.3,
"url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/"
},
{
"trust": 0.3,
"url": "http://www.avm.de/en/"
},
{
"trust": 0.3,
"url": "http://www.avm.de/de/produkte/fritzbox/index.html"
},
{
"trust": 0.3,
"url": "/archive/1/457406"
},
{
"trust": 0.3,
"url": "/archive/1/457829"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/23868/"
},
{
"trust": 0.1,
"url": "http://secunia.com/software_inspector/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/13298/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
}
],
"sources": [
{
"db": "BID",
"id": "22130"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-001431"
},
{
"db": "PACKETSTORM",
"id": "53817"
},
{
"db": "NVD",
"id": "CVE-2007-0431"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-379"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "22130"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-001431"
},
{
"db": "PACKETSTORM",
"id": "53817"
},
{
"db": "NVD",
"id": "CVE-2007-0431"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-379"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-01-19T00:00:00",
"db": "BID",
"id": "22130"
},
{
"date": "2012-06-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-001431"
},
{
"date": "2007-01-22T15:23:39",
"db": "PACKETSTORM",
"id": "53817"
},
{
"date": "2007-01-23T02:28:00",
"db": "NVD",
"id": "CVE-2007-0431"
},
{
"date": "2007-01-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200701-379"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-01-25T16:28:00",
"db": "BID",
"id": "22130"
},
{
"date": "2012-06-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-001431"
},
{
"date": "2018-10-16T16:32:32.793000",
"db": "NVD",
"id": "CVE-2007-0431"
},
{
"date": "2007-01-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200701-379"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200701-379"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "AVM FRITZ!Box VoIP Remote Denial of Service Vulnerability",
"sources": [
{
"db": "BID",
"id": "22130"
},
{
"db": "CNNVD",
"id": "CNNVD-200701-379"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200701-379"
}
],
"trust": 0.6
}
}
FKIE_CVE-2007-0431
Vulnerability from fkie_nvd - Published: 2007-01-23 02:28 - Updated: 2025-04-09 00:30{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:avm:fritzbox:7050:*:*:*:*:*:*:*",
"matchCriteriaId": "C3B3E061-E9F9-4B11-B1D8-68B1E4BB8D18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060)."
},
{
"lang": "es",
"value": "AVM Fritz!Box 7050, y posiblemente otros modelos de producto, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (cierre de aplicaci\u00f3n VoIP) mediante un paquete UDP de longitud cero enviado al puerto SIP (puerto 5060)."
}
],
"id": "CVE-2007-0431",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-01-23T02:28:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
},
{
"source": "cve@mitre.org",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
},
{
"source": "cve@mitre.org",
"url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/32940"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/23868"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22130"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/0272"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/32940"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/23868"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22130"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/0272"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2007-0431 (GCVE-0-2007-0431)
Vulnerability from cvelistv5 – Published: 2007-01-23 02:00 – Updated: 2024-08-07 12:19- n/a
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:19:30.187Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
},
{
"name": "22130",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22130"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
},
{
"name": "23868",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23868"
},
{
"name": "ADV-2007-0272",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0272"
},
{
"name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
},
{
"name": "fritzbox-udp-packet-dos(31633)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
},
{
"name": "32940",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/32940"
},
{
"name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-01-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
},
{
"name": "22130",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22130"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
},
{
"name": "23868",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23868"
},
{
"name": "ADV-2007-0272",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0272"
},
{
"name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
},
{
"name": "fritzbox-udp-packet-dos(31633)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
},
{
"name": "32940",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/32940"
},
{
"name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0431",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
},
{
"name": "22130",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22130"
},
{
"name": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS",
"refsource": "MISC",
"url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
},
{
"name": "23868",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23868"
},
{
"name": "ADV-2007-0272",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0272"
},
{
"name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
},
{
"name": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt",
"refsource": "CONFIRM",
"url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
},
{
"name": "fritzbox-udp-packet-dos(31633)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
},
{
"name": "32940",
"refsource": "OSVDB",
"url": "http://osvdb.org/32940"
},
{
"name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-0431",
"datePublished": "2007-01-23T02:00:00",
"dateReserved": "2007-01-22T00:00:00",
"dateUpdated": "2024-08-07T12:19:30.187Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-0431 (GCVE-0-2007-0431)
Vulnerability from nvd – Published: 2007-01-23 02:00 – Updated: 2024-08-07 12:19- n/a
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:19:30.187Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
},
{
"name": "22130",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22130"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
},
{
"name": "23868",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23868"
},
{
"name": "ADV-2007-0272",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0272"
},
{
"name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
},
{
"name": "fritzbox-udp-packet-dos(31633)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
},
{
"name": "32940",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/32940"
},
{
"name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-01-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
},
{
"name": "22130",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22130"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
},
{
"name": "23868",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23868"
},
{
"name": "ADV-2007-0272",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0272"
},
{
"name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
},
{
"name": "fritzbox-udp-packet-dos(31633)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
},
{
"name": "32940",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/32940"
},
{
"name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0431",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
},
{
"name": "22130",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22130"
},
{
"name": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS",
"refsource": "MISC",
"url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
},
{
"name": "23868",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23868"
},
{
"name": "ADV-2007-0272",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0272"
},
{
"name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
},
{
"name": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt",
"refsource": "CONFIRM",
"url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
},
{
"name": "fritzbox-udp-packet-dos(31633)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
},
{
"name": "32940",
"refsource": "OSVDB",
"url": "http://osvdb.org/32940"
},
{
"name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-0431",
"datePublished": "2007-01-23T02:00:00",
"dateReserved": "2007-01-22T00:00:00",
"dateUpdated": "2024-08-07T12:19:30.187Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}