VAR-200911-0308

Vulnerability from variot - Updated: 2023-12-18 13:25

Multiple buffer overflows in the Marvell wireless driver, as used in Linksys WAP4400N Wi-Fi access point with firmware 1.2.17 on the Marvell 88W8361P-BEM1 chipset, and other products, allow remote 802.11-authenticated users to cause a denial of service (wireless access point crash) and possibly execute arbitrary code via an association request with long (1) rates, (2) extended rates, and unspecified other information elements. Linksys WAP4400N wireless access point devices are prone to a denial-of-service vulnerability because they fail to adequately verify user-supplied input. Remote attackers can exploit this issue to hang or reboot a vulnerable device, denying service to legitimate users. Attackers may also be able to run arbitrary code, but this has not been confirmed. Linksys WAP4400N devices running firmware 1.2.17 are vulnerable. NOTE: Since the flaw is in the Marvell 88W8361P-BEM1 chipset driver, other devices and firmware versions using the same code may also be affected. This can be achieved only after a successful 802.11 authentication (in "Open" or "Shared" mode according to the configuration of the wireless access point). This security vulnerability was originally reported to Linksys, updated firmwares should be available on Cisco/Linksys web site. Any other wireless device relying on this vulnerable wireless driver is likely to be vulnerable.

Credits:

  • This vulnerability was discovered by Laurent Butti from France Telecom / Orange . ----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability intelligence source on the market.

Implement it through Secunia.

For more information visit: http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com


TITLE: Linksys WAP4400N Association Request Denial of Service

SECUNIA ADVISORY ID: SA37345

VERIFY ADVISORY: http://secunia.com/advisories/37345/

DESCRIPTION: A vulnerability has been reported in Linksys WAP4400N, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an unspecified error when parsing information elements included in association requests and can be exploited to reboot or hang an affected device.

The vulnerability is reported in firmware version 1.2.17.

SOLUTION: Reportedly fixed in firmware version 1.2.19.

PROVIDED AND/OR DISCOVERED BY: Laurent Butti, France Telecom / Orange

ORIGINAL ADVISORY: http://archives.neohapsis.com/archives/bugtraq/current/0074.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200911-0308",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wap4400n",
        "scope": "eq",
        "trust": 1.4,
        "vendor": "linksys",
        "version": "1.2.17"
      },
      {
        "model": "88w8361p-bem chipset",
        "scope": null,
        "trust": 1.4,
        "vendor": "marvell",
        "version": null
      },
      {
        "model": "88w8361p-bem chipset",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "marvell",
        "version": "*"
      },
      {
        "model": "wap4400n",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco linksys",
        "version": "1.2.17"
      },
      {
        "model": "semiconductor 88w8361p-bem1 chipset",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "marvell",
        "version": "0"
      },
      {
        "model": "wap4400n",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "1.2.19"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2007-5475"
      },
      {
        "db": "BID",
        "id": "37017"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004039"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5475"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200911-143"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:marvell:88w8361p-bem_chipset:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:linksys:wap4400n:1.2.17:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-5475"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Laurent Butti",
    "sources": [
      {
        "db": "BID",
        "id": "37017"
      },
      {
        "db": "PACKETSTORM",
        "id": "82664"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200911-143"
      }
    ],
    "trust": 1.0
  },
  "cve": "CVE-2007-5475",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 6.8,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2007-5475",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "VHN-28837",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2007-5475",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200911-143",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-28837",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2007-5475",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-28837"
      },
      {
        "db": "VULMON",
        "id": "CVE-2007-5475"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004039"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5475"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200911-143"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple buffer overflows in the Marvell wireless driver, as used in Linksys WAP4400N Wi-Fi access point with firmware 1.2.17 on the Marvell 88W8361P-BEM1 chipset, and other products, allow remote 802.11-authenticated users to cause a denial of service (wireless access point crash) and possibly execute arbitrary code via an association request with long (1) rates, (2) extended rates, and unspecified other information elements. Linksys WAP4400N wireless access point devices are prone to a denial-of-service vulnerability because they fail to adequately verify user-supplied input. \nRemote attackers can exploit this issue to hang or reboot a vulnerable device, denying service to legitimate users. Attackers may also be able to run arbitrary code, but this has not been confirmed. \nLinksys WAP4400N devices running firmware 1.2.17 are vulnerable. \nNOTE: Since the flaw is in the Marvell 88W8361P-BEM1 chipset driver, other devices and firmware versions using the same code may also be affected. This can be achieved only after a\nsuccessful 802.11 authentication (in \"Open\" or \"Shared\" mode according\nto the configuration of the wireless access point). \nThis security vulnerability was originally reported to Linksys, updated\nfirmwares should be available on Cisco/Linksys web site. Any other\nwireless device relying on this vulnerable wireless driver is likely to\nbe vulnerable. \n\nCredits:\n--------\n* This vulnerability was discovered by Laurent Butti from France Telecom\n/ Orange\n. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management)  \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nLinksys WAP4400N Association Request Denial of Service\n\nSECUNIA ADVISORY ID:\nSA37345\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37345/\n\nDESCRIPTION:\nA vulnerability has been reported in Linksys WAP4400N, which can be\nexploited by malicious people to cause a DoS (Denial of Service). \n\nThe vulnerability is caused due to an unspecified error when parsing\ninformation elements included in association requests and can be\nexploited to reboot or hang an affected device. \n\nThe vulnerability is reported in firmware version 1.2.17. \n\nSOLUTION:\nReportedly fixed in firmware version 1.2.19. \n\nPROVIDED AND/OR DISCOVERED BY:\nLaurent Butti, France Telecom / Orange\n\nORIGINAL ADVISORY:\nhttp://archives.neohapsis.com/archives/bugtraq/current/0074.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-5475"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004039"
      },
      {
        "db": "BID",
        "id": "37017"
      },
      {
        "db": "VULHUB",
        "id": "VHN-28837"
      },
      {
        "db": "VULMON",
        "id": "CVE-2007-5475"
      },
      {
        "db": "PACKETSTORM",
        "id": "82664"
      },
      {
        "db": "PACKETSTORM",
        "id": "82611"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-5475",
        "trust": 3.0
      },
      {
        "db": "SECUNIA",
        "id": "37345",
        "trust": 1.9
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3239",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004039",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200911-143",
        "trust": 0.7
      },
      {
        "db": "BUGTRAQ",
        "id": "20091110 MARVELL DRIVER MULTIPLE INFORMATION ELEMENT OVERFLOWS",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "37017",
        "trust": 0.5
      },
      {
        "db": "PACKETSTORM",
        "id": "82664",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-28837",
        "trust": 0.1
      },
      {
        "db": "VUPEN",
        "id": "2009/3239",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2007-5475",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "82611",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-28837"
      },
      {
        "db": "VULMON",
        "id": "CVE-2007-5475"
      },
      {
        "db": "BID",
        "id": "37017"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004039"
      },
      {
        "db": "PACKETSTORM",
        "id": "82664"
      },
      {
        "db": "PACKETSTORM",
        "id": "82611"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5475"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200911-143"
      }
    ]
  },
  "id": "VAR-200911-0308",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-28837"
      }
    ],
    "trust": 0.7
  },
  "last_update_date": "2023-12-18T13:25:22.245000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Linksys",
        "trust": 0.8,
        "url": "http://home.cisco.com/en-apac/home"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.marvell.com/"
      },
      {
        "title": "wifuzzit",
        "trust": 0.1,
        "url": "https://github.com/0xd012/wifuzzit "
      },
      {
        "title": "wifuzzit",
        "trust": 0.1,
        "url": "https://github.com/flowerhack/wifuzzit "
      },
      {
        "title": "wifuzzit",
        "trust": 0.1,
        "url": "https://github.com/84kaliplexon3/wifuzzit "
      },
      {
        "title": "wifuzzit",
        "trust": 0.1,
        "url": "https://github.com/plexone2019/wifuzzit "
      },
      {
        "title": "wifuzzit",
        "trust": 0.1,
        "url": "https://github.com/wi-fi-analyzer/wifuzzit "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2007-5475"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004039"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-28837"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004039"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5475"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/37345"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/507781/100/0/threaded"
      },
      {
        "trust": 1.2,
        "url": "http://www.vupen.com/english/advisories/2009/3239"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5475"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-5475"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/507781/100/0/threaded"
      },
      {
        "trust": 0.3,
        "url": "http://www.marvell.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.linksys.com/servlet/satellite?c=l_product_c2\u0026childpagename=us%2flayout\u0026cid=1153780863744\u0026pagename=linksys%2fcommon%2fvisitorwrapper\u0026lid=6374487090b05"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/507781"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/119.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.securityfocus.com/bid/37017"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/0xd012/wifuzzit"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2007-5475"
      },
      {
        "trust": 0.1,
        "url": "http://archives.neohapsis.com/archives/bugtraq/current/0074.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/37345/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-28837"
      },
      {
        "db": "VULMON",
        "id": "CVE-2007-5475"
      },
      {
        "db": "BID",
        "id": "37017"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004039"
      },
      {
        "db": "PACKETSTORM",
        "id": "82664"
      },
      {
        "db": "PACKETSTORM",
        "id": "82611"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5475"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200911-143"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-28837"
      },
      {
        "db": "VULMON",
        "id": "CVE-2007-5475"
      },
      {
        "db": "BID",
        "id": "37017"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004039"
      },
      {
        "db": "PACKETSTORM",
        "id": "82664"
      },
      {
        "db": "PACKETSTORM",
        "id": "82611"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-5475"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200911-143"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-11-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-28837"
      },
      {
        "date": "2009-11-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2007-5475"
      },
      {
        "date": "2009-11-10T00:00:00",
        "db": "BID",
        "id": "37017"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-004039"
      },
      {
        "date": "2009-11-17T01:41:03",
        "db": "PACKETSTORM",
        "id": "82664"
      },
      {
        "date": "2009-11-16T09:29:55",
        "db": "PACKETSTORM",
        "id": "82611"
      },
      {
        "date": "2009-11-12T23:30:00.517000",
        "db": "NVD",
        "id": "CVE-2007-5475"
      },
      {
        "date": "2009-11-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200911-143"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-28837"
      },
      {
        "date": "2018-10-15T00:00:00",
        "db": "VULMON",
        "id": "CVE-2007-5475"
      },
      {
        "date": "2009-11-13T18:16:00",
        "db": "BID",
        "id": "37017"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-004039"
      },
      {
        "date": "2018-10-15T21:45:12.547000",
        "db": "NVD",
        "id": "CVE-2007-5475"
      },
      {
        "date": "2009-11-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200911-143"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200911-143"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linksys WAP4400N Wi-Fi Access point buffer overflow vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-004039"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200911-143"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…