Search criteria

3 vulnerabilities found for 560 by snapgear

VAR-200703-0036

Vulnerability from variot - Updated: 2025-04-10 23:22

SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613. SnapGear is prone to a denial-of-service vulnerability because the device fails to handle exceptional conditions. An attacker can exploit this issue to cause the affected device to stop processing packets, denying service to legitimate users. This issue affects the 560, 585, 580, 640, 710, and 720 models. This vulnerability is different from CVE-2006-4613.


Want a new job? http://secunia.com/secunia_vacancies/

Secunia is looking for new researchers with a reversing background and experience in writing exploit code: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ http://secunia.com/Disassembling_og_Reversing/


TITLE: SnapGear Packet Handling Denial of Service

SECUNIA ADVISORY ID: SA24388

VERIFY ADVISORY: http://secunia.com/advisories/24388/

CRITICAL: Less critical

IMPACT: DoS

WHERE:

From remote

OPERATING SYSTEM: SnapGear 3.x http://secunia.com/product/11807/

DESCRIPTION: A vulnerability has been reported in SnapGear, which can be exploited by malicious people to cause a DoS (Denial of Service).

An unspecified error can be exploited to cause all packets to be dropped when the device is under a packet flood.

SOLUTION: Update to firmware version 3.1.4u5.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://www.cyberguard.info/snapgear/releases.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200703-0036",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "710",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "snapgear",
        "version": "1.8_firmware"
      },
      {
        "model": "720",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "snapgear",
        "version": "1.7.8_firmware"
      },
      {
        "model": "720",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "snapgear",
        "version": "1.8.4_firmware"
      },
      {
        "model": "560",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "snapgear",
        "version": "1.7.10_firmware"
      },
      {
        "model": "720",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "snapgear",
        "version": "1.8_firmware"
      },
      {
        "model": "720",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "snapgear",
        "version": "1.8.5_firmware"
      },
      {
        "model": "720",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "snapgear",
        "version": "3.1.4u2_firmware"
      },
      {
        "model": "720",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "snapgear",
        "version": "1.7.10_firmware"
      },
      {
        "model": "560",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "snapgear",
        "version": "1.7.8_firmware"
      },
      {
        "model": "710",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "snapgear",
        "version": "3.1.4u2_firmware"
      },
      {
        "model": "710",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.7.8_firmware"
      },
      {
        "model": "580",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.7.10_firmware"
      },
      {
        "model": "580",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.8_firmware"
      },
      {
        "model": "580",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.8.4_firmware"
      },
      {
        "model": "710",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.7.9_firmware"
      },
      {
        "model": "580",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.8.5_firmware"
      },
      {
        "model": "560",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.7.9_firmware"
      },
      {
        "model": "640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.7.8_firmware"
      },
      {
        "model": "560",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.8_firmware"
      },
      {
        "model": "640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "3.1.4u2_firmware"
      },
      {
        "model": "710",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.7.10_firmware"
      },
      {
        "model": "560",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.8.4_firmware"
      },
      {
        "model": "710",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.8.4_firmware"
      },
      {
        "model": "560",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "3.1.4u2"
      },
      {
        "model": "560",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.8.5_firmware"
      },
      {
        "model": "640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.7.9_firmware"
      },
      {
        "model": "710",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.8.5_firmware"
      },
      {
        "model": "720",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.7.9_firmware"
      },
      {
        "model": "640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.8_firmware"
      },
      {
        "model": "640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.8.4_firmware"
      },
      {
        "model": "640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.7.10_firmware"
      },
      {
        "model": "585",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "3.1.4u2_firmware"
      },
      {
        "model": "640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.8.5_firmware"
      },
      {
        "model": "585",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.7.8_firmware"
      },
      {
        "model": "585",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.7.9_firmware"
      },
      {
        "model": "585",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.7.10_firmware"
      },
      {
        "model": "585",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.8_firmware"
      },
      {
        "model": "580",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.7.8_firmware"
      },
      {
        "model": "580",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "3.1.4u2_firmware"
      },
      {
        "model": "585",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.8.4_firmware"
      },
      {
        "model": "585",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.8.5_firmware"
      },
      {
        "model": "580",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snapgear",
        "version": "1.7.9_firmware"
      },
      {
        "model": "560",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "snapgear",
        "version": "3.1.4u5"
      },
      {
        "model": "580",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "snapgear",
        "version": "3.1.4u5"
      },
      {
        "model": "585",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "snapgear",
        "version": "3.1.4u5"
      },
      {
        "model": "640",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "snapgear",
        "version": "3.1.4u5"
      },
      {
        "model": "710",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "snapgear",
        "version": "3.1.4u5"
      },
      {
        "model": "720",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "snapgear",
        "version": "3.1.4u5"
      },
      {
        "model": "os u2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snapgear",
        "version": "3.1.4"
      },
      {
        "model": "os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snapgear",
        "version": "1.8.5"
      },
      {
        "model": "os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snapgear",
        "version": "1.8.4"
      },
      {
        "model": "os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snapgear",
        "version": "1.8"
      },
      {
        "model": "os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snapgear",
        "version": "1.7.10"
      },
      {
        "model": "os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snapgear",
        "version": "1.7.9"
      },
      {
        "model": "os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snapgear",
        "version": "1.7.8"
      },
      {
        "model": "os 3.1.4u5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "snapgear",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "22835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-005211"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-233"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1324"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:snapgear:560",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:snapgear:580",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:snapgear:585",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:snapgear:640",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:snapgear:710",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:snapgear:720",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-005211"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "22835"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-233"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2007-1324",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2007-1324",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-24686",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2007-1324",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-1324",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200703-233",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-24686",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24686"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-005211"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-233"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1324"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613. SnapGear is prone to a denial-of-service vulnerability because the device fails to handle exceptional conditions. \nAn attacker can exploit this issue to cause the affected device to stop processing packets, denying service to legitimate users. \nThis issue affects the 560, 585, 580, 640, 710, and 720 models. This vulnerability is different from CVE-2006-4613. \n\n----------------------------------------------------------------------\n\nWant a new job?\nhttp://secunia.com/secunia_vacancies/\n\nSecunia is looking for new researchers with a reversing background\nand experience in writing exploit code:\nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\nhttp://secunia.com/Disassembling_og_Reversing/\n\n----------------------------------------------------------------------\n\nTITLE:\nSnapGear Packet Handling Denial of Service\n\nSECUNIA ADVISORY ID:\nSA24388\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/24388/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nSnapGear 3.x\nhttp://secunia.com/product/11807/\n\nDESCRIPTION:\nA vulnerability has been reported in SnapGear, which can be exploited\nby malicious people to cause a DoS (Denial of Service). \n\nAn unspecified error can be exploited to cause all packets to be\ndropped when the device is under a packet flood. \n\nSOLUTION:\nUpdate to firmware version 3.1.4u5. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.cyberguard.info/snapgear/releases.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1324"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-005211"
      },
      {
        "db": "BID",
        "id": "22835"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24686"
      },
      {
        "db": "PACKETSTORM",
        "id": "54857"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-1324",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "22835",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "24388",
        "trust": 1.8
      },
      {
        "db": "OSVDB",
        "id": "33864",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-0850",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-005211",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-233",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "32824",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-24686",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "54857",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24686"
      },
      {
        "db": "BID",
        "id": "22835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-005211"
      },
      {
        "db": "PACKETSTORM",
        "id": "54857"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-233"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1324"
      }
    ]
  },
  "id": "VAR-200703-0036",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24686"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-10T23:22:32.983000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1324"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://www.cyberguard.info/snapgear/releases.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/22835"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/33864"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/24388"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2007/0850"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1324"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1324"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/32824"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2007/0850"
      },
      {
        "trust": 0.3,
        "url": "http://www.snapgear.com/liteplus.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/11807/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/disassembling_og_reversing/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_vacancies/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/24388/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24686"
      },
      {
        "db": "BID",
        "id": "22835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-005211"
      },
      {
        "db": "PACKETSTORM",
        "id": "54857"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-233"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1324"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-24686"
      },
      {
        "db": "BID",
        "id": "22835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-005211"
      },
      {
        "db": "PACKETSTORM",
        "id": "54857"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-233"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1324"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-03-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-24686"
      },
      {
        "date": "2007-03-06T00:00:00",
        "db": "BID",
        "id": "22835"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-005211"
      },
      {
        "date": "2007-03-08T00:54:52",
        "db": "PACKETSTORM",
        "id": "54857"
      },
      {
        "date": "2007-03-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200703-233"
      },
      {
        "date": "2007-03-07T21:19:00",
        "db": "NVD",
        "id": "CVE-2007-1324"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-24686"
      },
      {
        "date": "2015-05-12T19:33:00",
        "db": "BID",
        "id": "22835"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-005211"
      },
      {
        "date": "2007-03-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200703-233"
      },
      {
        "date": "2025-04-09T00:30:58.490000",
        "db": "NVD",
        "id": "CVE-2007-1324"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-233"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SnapGear Service disruption in  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-005211"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-233"
      }
    ],
    "trust": 0.6
  }
}

CVE-2007-1324 (GCVE-0-2007-1324)

Vulnerability from nvd – Published: 2007-03-07 21:00 – Updated: 2024-08-07 12:50
VLAI?
Summary
SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://osvdb.org/33864 vdb-entryx_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/24388 third-party-advisoryx_refsource_SECUNIA
http://www.cyberguard.info/snapgear/releases.html x_refsource_CONFIRM
http://www.securityfocus.com/bid/22835 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2007/0850 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:50:35.586Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "33864",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/33864"
          },
          {
            "name": "snapgear-packet-dos(32824)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
          },
          {
            "name": "24388",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24388"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cyberguard.info/snapgear/releases.html"
          },
          {
            "name": "22835",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22835"
          },
          {
            "name": "ADV-2007-0850",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0850"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-03-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "33864",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/33864"
        },
        {
          "name": "snapgear-packet-dos(32824)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
        },
        {
          "name": "24388",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24388"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cyberguard.info/snapgear/releases.html"
        },
        {
          "name": "22835",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22835"
        },
        {
          "name": "ADV-2007-0850",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0850"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1324",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "33864",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/33864"
            },
            {
              "name": "snapgear-packet-dos(32824)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
            },
            {
              "name": "24388",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24388"
            },
            {
              "name": "http://www.cyberguard.info/snapgear/releases.html",
              "refsource": "CONFIRM",
              "url": "http://www.cyberguard.info/snapgear/releases.html"
            },
            {
              "name": "22835",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22835"
            },
            {
              "name": "ADV-2007-0850",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0850"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1324",
    "datePublished": "2007-03-07T21:00:00",
    "dateReserved": "2007-03-07T00:00:00",
    "dateUpdated": "2024-08-07T12:50:35.586Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-1324 (GCVE-0-2007-1324)

Vulnerability from cvelistv5 – Published: 2007-03-07 21:00 – Updated: 2024-08-07 12:50
VLAI?
Summary
SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://osvdb.org/33864 vdb-entryx_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/24388 third-party-advisoryx_refsource_SECUNIA
http://www.cyberguard.info/snapgear/releases.html x_refsource_CONFIRM
http://www.securityfocus.com/bid/22835 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2007/0850 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:50:35.586Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "33864",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/33864"
          },
          {
            "name": "snapgear-packet-dos(32824)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
          },
          {
            "name": "24388",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24388"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cyberguard.info/snapgear/releases.html"
          },
          {
            "name": "22835",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22835"
          },
          {
            "name": "ADV-2007-0850",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0850"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-03-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "33864",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/33864"
        },
        {
          "name": "snapgear-packet-dos(32824)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
        },
        {
          "name": "24388",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24388"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cyberguard.info/snapgear/releases.html"
        },
        {
          "name": "22835",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22835"
        },
        {
          "name": "ADV-2007-0850",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0850"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1324",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SnapGear 560, 585, 580, 640, 710, and 720 appliances before the 3.1.4u5 firmware allow remote attackers to cause a denial of service (complete packet loss) via a packet flood, a different vulnerability than CVE-2006-4613."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "33864",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/33864"
            },
            {
              "name": "snapgear-packet-dos(32824)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32824"
            },
            {
              "name": "24388",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24388"
            },
            {
              "name": "http://www.cyberguard.info/snapgear/releases.html",
              "refsource": "CONFIRM",
              "url": "http://www.cyberguard.info/snapgear/releases.html"
            },
            {
              "name": "22835",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22835"
            },
            {
              "name": "ADV-2007-0850",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0850"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1324",
    "datePublished": "2007-03-07T21:00:00",
    "dateReserved": "2007-03-07T00:00:00",
    "dateUpdated": "2024-08-07T12:50:35.586Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}