FKIE_CVE-2007-1324
Vulnerability from fkie_nvd - Published: 2007-03-07 21:19 - Updated: 2025-04-09 00:30
Severity ?
Summary
SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| snapgear | 560 | 1.7.8_firmware | |
| snapgear | 560 | 1.7.9_firmware | |
| snapgear | 560 | 1.7.10_firmware | |
| snapgear | 560 | 1.8.4_firmware | |
| snapgear | 560 | 1.8.5_firmware | |
| snapgear | 560 | 1.8_firmware | |
| snapgear | 560 | 3.1.4u2 | |
| snapgear | 580 | 1.7.8_firmware | |
| snapgear | 580 | 1.7.9_firmware | |
| snapgear | 580 | 1.7.10_firmware | |
| snapgear | 580 | 1.8.4_firmware | |
| snapgear | 580 | 1.8.5_firmware | |
| snapgear | 580 | 1.8_firmware | |
| snapgear | 580 | 3.1.4u2_firmware | |
| snapgear | 585 | 1.7.8_firmware | |
| snapgear | 585 | 1.7.9_firmware | |
| snapgear | 585 | 1.7.10_firmware | |
| snapgear | 585 | 1.8.4_firmware | |
| snapgear | 585 | 1.8.5_firmware | |
| snapgear | 585 | 1.8_firmware | |
| snapgear | 585 | 3.1.4u2_firmware | |
| snapgear | 640 | 1.7.8_firmware | |
| snapgear | 640 | 1.7.9_firmware | |
| snapgear | 640 | 1.7.10_firmware | |
| snapgear | 640 | 1.8.4_firmware | |
| snapgear | 640 | 1.8.5_firmware | |
| snapgear | 640 | 1.8_firmware | |
| snapgear | 640 | 3.1.4u2_firmware | |
| snapgear | 710 | 1.7.8_firmware | |
| snapgear | 710 | 1.7.9_firmware | |
| snapgear | 710 | 1.7.10_firmware | |
| snapgear | 710 | 1.8.4_firmware | |
| snapgear | 710 | 1.8.5_firmware | |
| snapgear | 710 | 1.8_firmware | |
| snapgear | 710 | 3.1.4u2_firmware | |
| snapgear | 720 | 1.7.8_firmware | |
| snapgear | 720 | 1.7.9_firmware | |
| snapgear | 720 | 1.7.10_firmware | |
| snapgear | 720 | 1.8.4_firmware | |
| snapgear | 720 | 1.8.5_firmware | |
| snapgear | 720 | 1.8_firmware | |
| snapgear | 720 | 3.1.4u2_firmware |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:snapgear:560:1.7.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "2CE2340F-9228-4491-BD18-237518BE8883",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:560:1.7.9_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F6607D-ACA3-4D08-940D-2CE3B4BDBDF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:560:1.7.10_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "A428A676-006B-4313-8D1E-7281E87152DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:560:1.8.4_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "69C18664-B609-460B-84EB-3A79EE5D9AB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:560:1.8.5_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "F292707F-180B-493B-AA5D-0DC6ABF86E05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:560:1.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "0F8BD2FF-8D2E-4ADA-9372-50BFA0BE5A14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:560:3.1.4u2:*:*:*:*:*:*:*",
"matchCriteriaId": "8BF22988-69AF-48EE-9CF7-56DE94E1A32B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:580:1.7.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "1518061C-7B28-4ECC-B891-DD7474F0F908",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:580:1.7.9_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "C44C97ED-41CA-43ED-AE5F-28BE852468C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:580:1.7.10_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "FF1D4E8B-15CB-4431-B00C-71FF6B409F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:580:1.8.4_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "9B9DF9CF-CC4D-463F-8906-C30C5D63CE0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:580:1.8.5_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "881D6995-B00E-4F7A-B242-7774F3358BAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:580:1.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "C964D968-EB4B-4A26-9806-9F87D7D7432D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:580:3.1.4u2_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "72E71919-E23B-4B0F-872D-49626D13E762",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:585:1.7.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "C7C0739F-513C-4553-887F-9935FB09D0B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:585:1.7.9_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "40D50ED5-7FB8-4878-A519-CB610AB87D81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:585:1.7.10_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A68998-9F26-42EE-AD7F-7660409CFE99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:585:1.8.4_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "122D11B3-3044-4BCC-97F8-753720AC6615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:585:1.8.5_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "7E66842F-3EC5-4089-8782-2B063D4457A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:585:1.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "0B58ABEC-7257-456F-952B-C913D5C59FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:585:3.1.4u2_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "7D4B9B73-C47D-4183-88F4-717028E64840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:640:1.7.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "D79801B0-952C-448C-A25D-AAE002DA4200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:640:1.7.9_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "E1F43EEB-7F6E-4D4C-BFA5-5BEDA1A54557",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:640:1.7.10_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "7D78AC34-6C21-4162-9777-A7563FD56075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:640:1.8.4_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "3BEC2E82-E2A6-4D38-8315-5BBFFBF507FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:640:1.8.5_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "0C92B730-3FDF-4BBE-BF87-6962E58B3611",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:640:1.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "8124ED35-32B6-4D66-B658-2585B18970D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:640:3.1.4u2_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "69A20968-FCE5-462B-911E-2074D0ECD56F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:710:1.7.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "28B080D5-858C-464E-932A-53A6730AC5F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:710:1.7.9_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "78C587BD-DC7E-4EC8-800C-CE21029C3BF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:710:1.7.10_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "327B9621-D6C1-49AB-BF85-57EB9F3E6035",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:710:1.8.4_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD5C0BE-34CB-43D2-AF9E-8F1480A02281",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:710:1.8.5_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "AB2D37B0-FBE1-4A98-8562-01DE1F828D1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:710:1.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "A0D8045C-E9FA-42B2-8824-F27133608AC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:710:3.1.4u2_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "33971918-8B65-46AB-84DD-695081B724D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:720:1.7.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "EB898390-05D1-485D-B258-7B0F246F0A21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:720:1.7.9_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "BAA03627-9DA9-40E0-BEBA-F2CB00C04EC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:720:1.7.10_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "F90B69E9-72BD-4C0F-A045-A2BC11B651FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:720:1.8.4_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "26BF65DA-20F6-4956-B54A-004FFBAA2756",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:720:1.8.5_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "A9DB2DC3-20D9-4677-AC3D-0C05A16F7FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:720:1.8_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "64ADDE44-D64D-4C85-85ED-28CD9828DDA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:snapgear:720:3.1.4u2_firmware:*:*:*:*:*:*:*",
"matchCriteriaId": "F6431FA9-06C5-48F4-B236-FD72A4C3F03F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613."
},
{
"lang": "es",
"value": "Los dispositivos (appliance) SnapGear 560, 585, 580, 640, 710, y 720 versiones anteriores al firmware 3.1.4u5, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (p\u00e9rdida completa de paquete) mediante una inundaci\u00f3n de paquetes, vulnerabilidad distinta a CVE-2006-4613."
}
],
"id": "CVE-2007-1324",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-03-07T21:19:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/33864"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/24388"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory",
"URL Repurposed"
],
"url": "http://www.cyberguard.info/snapgear/releases.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22835"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/0850"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/33864"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/24388"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory",
"URL Repurposed"
],
"url": "http://www.cyberguard.info/snapgear/releases.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22835"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/0850"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…