Search criteria

4 vulnerabilities found for fritzbox by avm

VAR-200701-0211

Vulnerability from variot - Updated: 2023-12-18 13:15

AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060). FRITZ!Box is prone to a remote denial-of-service vulnerability. A remote attacker can exploit this issue to crash the VoIP-telephony service, effectively denying service to legitimate users.


Secunia is proud to announce the availability of the Secunia Software Inspector.

The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor.

Try it out online: http://secunia.com/software_inspector/


TITLE: Fritz!Box UDP Packet SIP Denial of Service

SECUNIA ADVISORY ID: SA23868

VERIFY ADVISORY: http://secunia.com/advisories/23868/

CRITICAL: Moderately critical

IMPACT: DoS

WHERE:

From remote

OPERATING SYSTEM: AVM Fritz!Box 7050 http://secunia.com/product/13298/

DESCRIPTION: Matthias Wenzel has reported a vulnerability in AVM Fritz!Box 7050, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the handling of certain UDP packets.

SOLUTION: Use another device.

PROVIDED AND/OR DISCOVERED BY: Matthias Wenzel

ORIGINAL ADVISORY: http://mazzoo.de/blog/2007/01/18#FritzBox_DoS


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200701-0211",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "fritzbox",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "avm",
        "version": "7050"
      },
      {
        "model": "fritz!box",
        "scope": null,
        "trust": 0.8,
        "vendor": "avm",
        "version": null
      },
      {
        "model": "fritz!box",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avm",
        "version": "7050"
      },
      {
        "model": "fritz!box",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "avm",
        "version": "705014.4.2"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:avm:fritzbox:7050:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Matthias Wenzel",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2007-0431",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.8,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2007-0431",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2007-0431",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200701-379",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060). FRITZ!Box is prone to a remote denial-of-service vulnerability. \nA remote attacker can exploit this issue to crash the VoIP-telephony service, effectively denying service to legitimate users. \n\n----------------------------------------------------------------------\n\nSecunia is proud to announce the availability of the Secunia Software\nInspector. \n\nThe Secunia Software Inspector is a free service that detects insecure\nversions of software that you may have installed in your system. When\ninsecure versions are detected, the Secunia Software Inspector also\nprovides thorough guidelines for updating the software to the latest\nsecure version from the vendor. \n\nTry it out online:\nhttp://secunia.com/software_inspector/\n\n----------------------------------------------------------------------\n\nTITLE:\nFritz!Box UDP Packet SIP Denial of Service\n\nSECUNIA ADVISORY ID:\nSA23868\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/23868/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nAVM Fritz!Box 7050\nhttp://secunia.com/product/13298/\n\nDESCRIPTION:\nMatthias Wenzel has reported a vulnerability in AVM Fritz!Box 7050,\nwhich can be exploited by malicious people to cause a DoS (Denial of\nService). \n\nThe vulnerability is caused due to an error within the handling of\ncertain UDP packets. \n\nSOLUTION:\nUse another device. \n\nPROVIDED AND/OR DISCOVERED BY:\nMatthias Wenzel\n\nORIGINAL ADVISORY:\nhttp://mazzoo.de/blog/2007/01/18#FritzBox_DoS\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "PACKETSTORM",
        "id": "53817"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-0431",
        "trust": 2.4
      },
      {
        "db": "BID",
        "id": "22130",
        "trust": 1.9
      },
      {
        "db": "SECUNIA",
        "id": "23868",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "32940",
        "trust": 1.6
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-0272",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "31633",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20070119 DOS AGAINST AVM FRITZ!BOX 7050 (AND OTHERS)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20070119 DOS AGAINST AVM FRITZ!BOX 7050 (AND OTHERS)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20070123 RE: DOS AGAINST AVM FRITZ!BOX 7050 (AND OTHERS)",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "53817",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "PACKETSTORM",
        "id": "53817"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ]
  },
  "id": "VAR-200701-0211",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.4861111
  },
  "last_update_date": "2023-12-18T13:15:49.795000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.avm.de/en/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "http://mazzoo.de/blog/2007/01/18#fritzbox_dos"
      },
      {
        "trust": 1.6,
        "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
      },
      {
        "trust": 1.6,
        "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
      },
      {
        "trust": 1.6,
        "url": "http://osvdb.org/32940"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/23868"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/22130"
      },
      {
        "trust": 1.0,
        "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
      },
      {
        "trust": 1.0,
        "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2007/0272"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0431"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0431"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/457406/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/31633"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/457829/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2007/0272"
      },
      {
        "trust": 0.3,
        "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/"
      },
      {
        "trust": 0.3,
        "url": "http://www.avm.de/en/"
      },
      {
        "trust": 0.3,
        "url": "http://www.avm.de/de/produkte/fritzbox/index.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/457406"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/457829"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/23868/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/software_inspector/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13298/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "PACKETSTORM",
        "id": "53817"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "PACKETSTORM",
        "id": "53817"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-01-19T00:00:00",
        "db": "BID",
        "id": "22130"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "date": "2007-01-22T15:23:39",
        "db": "PACKETSTORM",
        "id": "53817"
      },
      {
        "date": "2007-01-23T02:28:00",
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "date": "2007-01-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-01-25T16:28:00",
        "db": "BID",
        "id": "22130"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "date": "2018-10-16T16:32:32.793000",
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "date": "2007-01-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "AVM FRITZ!Box VoIP Remote Denial of Service Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ],
    "trust": 0.6
  }
}

FKIE_CVE-2007-0431

Vulnerability from fkie_nvd - Published: 2007-01-23 02:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060).
References
cve@mitre.orgftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt
cve@mitre.orghttp://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html
cve@mitre.orghttp://mazzoo.de/blog/2007/01/18#FritzBox_DoS
cve@mitre.orghttp://osvdb.org/32940
cve@mitre.orghttp://secunia.com/advisories/23868
cve@mitre.orghttp://www.securityfocus.com/archive/1/457406/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/457829/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/22130
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/0272
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/31633
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html
af854a3a-2127-422b-91ae-364da2661108http://mazzoo.de/blog/2007/01/18#FritzBox_DoS
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/32940
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23868
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/457406/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/457829/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/22130
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0272
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/31633
Impacted products
Vendor Product Version
avm fritzbox 7050

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:avm:fritzbox:7050:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3B3E061-E9F9-4B11-B1D8-68B1E4BB8D18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060)."
    },
    {
      "lang": "es",
      "value": "AVM Fritz!Box 7050, y posiblemente otros modelos de producto, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (cierre de aplicaci\u00f3n VoIP) mediante un paquete UDP de longitud cero enviado al puerto SIP (puerto 5060)."
    }
  ],
  "id": "CVE-2007-0431",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-01-23T02:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/32940"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23868"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/22130"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/0272"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/32940"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23868"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/22130"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2007-0431 (GCVE-0-2007-0431)

Vulnerability from cvelistv5 – Published: 2007-01-23 02:00 – Updated: 2024-08-07 12:19
VLAI?
Summary
AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060).
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:19:30.187Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
          },
          {
            "name": "22130",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22130"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
          },
          {
            "name": "23868",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23868"
          },
          {
            "name": "ADV-2007-0272",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0272"
          },
          {
            "name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
          },
          {
            "name": "fritzbox-udp-packet-dos(31633)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
          },
          {
            "name": "32940",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/32940"
          },
          {
            "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-01-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
        },
        {
          "name": "22130",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22130"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
        },
        {
          "name": "23868",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23868"
        },
        {
          "name": "ADV-2007-0272",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0272"
        },
        {
          "name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
        },
        {
          "name": "fritzbox-udp-packet-dos(31633)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
        },
        {
          "name": "32940",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/32940"
        },
        {
          "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0431",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
            },
            {
              "name": "22130",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22130"
            },
            {
              "name": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS",
              "refsource": "MISC",
              "url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
            },
            {
              "name": "23868",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23868"
            },
            {
              "name": "ADV-2007-0272",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0272"
            },
            {
              "name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
            },
            {
              "name": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
            },
            {
              "name": "fritzbox-udp-packet-dos(31633)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
            },
            {
              "name": "32940",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/32940"
            },
            {
              "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0431",
    "datePublished": "2007-01-23T02:00:00",
    "dateReserved": "2007-01-22T00:00:00",
    "dateUpdated": "2024-08-07T12:19:30.187Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-0431 (GCVE-0-2007-0431)

Vulnerability from nvd – Published: 2007-01-23 02:00 – Updated: 2024-08-07 12:19
VLAI?
Summary
AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060).
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:19:30.187Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
          },
          {
            "name": "22130",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22130"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
          },
          {
            "name": "23868",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23868"
          },
          {
            "name": "ADV-2007-0272",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0272"
          },
          {
            "name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
          },
          {
            "name": "fritzbox-udp-packet-dos(31633)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
          },
          {
            "name": "32940",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/32940"
          },
          {
            "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-01-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
        },
        {
          "name": "22130",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22130"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
        },
        {
          "name": "23868",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23868"
        },
        {
          "name": "ADV-2007-0272",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0272"
        },
        {
          "name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
        },
        {
          "name": "fritzbox-udp-packet-dos(31633)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
        },
        {
          "name": "32940",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/32940"
        },
        {
          "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0431",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
            },
            {
              "name": "22130",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22130"
            },
            {
              "name": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS",
              "refsource": "MISC",
              "url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
            },
            {
              "name": "23868",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23868"
            },
            {
              "name": "ADV-2007-0272",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0272"
            },
            {
              "name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
            },
            {
              "name": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
            },
            {
              "name": "fritzbox-udp-packet-dos(31633)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
            },
            {
              "name": "32940",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/32940"
            },
            {
              "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0431",
    "datePublished": "2007-01-23T02:00:00",
    "dateReserved": "2007-01-22T00:00:00",
    "dateUpdated": "2024-08-07T12:19:30.187Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}