Search criteria

3 vulnerabilities found for fritzbox by avm

VAR-200701-0211

Vulnerability from variot - Updated: 2025-04-10 23:23

AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060). FRITZ!Box is prone to a remote denial-of-service vulnerability. A remote attacker can exploit this issue to crash the VoIP-telephony service, effectively denying service to legitimate users.


Secunia is proud to announce the availability of the Secunia Software Inspector.

The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor.

Try it out online: http://secunia.com/software_inspector/


TITLE: Fritz!Box UDP Packet SIP Denial of Service

SECUNIA ADVISORY ID: SA23868

VERIFY ADVISORY: http://secunia.com/advisories/23868/

CRITICAL: Moderately critical

IMPACT: DoS

WHERE:

From remote

OPERATING SYSTEM: AVM Fritz!Box 7050 http://secunia.com/product/13298/

DESCRIPTION: Matthias Wenzel has reported a vulnerability in AVM Fritz!Box 7050, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the handling of certain UDP packets.

SOLUTION: Use another device.

PROVIDED AND/OR DISCOVERED BY: Matthias Wenzel

ORIGINAL ADVISORY: http://mazzoo.de/blog/2007/01/18#FritzBox_DoS


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200701-0211",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "fritzbox",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "avm",
        "version": "7050"
      },
      {
        "model": "fritz!box",
        "scope": null,
        "trust": 0.8,
        "vendor": "avm",
        "version": null
      },
      {
        "model": "fritz!box",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avm",
        "version": "7050"
      },
      {
        "model": "fritz!box",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "avm",
        "version": "705014.4.2"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:avm:fritz%21_os",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Matthias Wenzel",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2007-0431",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2007-0431",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2007-0431",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-0431",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200701-379",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060). FRITZ!Box is prone to a remote denial-of-service vulnerability. \nA remote attacker can exploit this issue to crash the VoIP-telephony service, effectively denying service to legitimate users. \n\n----------------------------------------------------------------------\n\nSecunia is proud to announce the availability of the Secunia Software\nInspector. \n\nThe Secunia Software Inspector is a free service that detects insecure\nversions of software that you may have installed in your system. When\ninsecure versions are detected, the Secunia Software Inspector also\nprovides thorough guidelines for updating the software to the latest\nsecure version from the vendor. \n\nTry it out online:\nhttp://secunia.com/software_inspector/\n\n----------------------------------------------------------------------\n\nTITLE:\nFritz!Box UDP Packet SIP Denial of Service\n\nSECUNIA ADVISORY ID:\nSA23868\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/23868/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nAVM Fritz!Box 7050\nhttp://secunia.com/product/13298/\n\nDESCRIPTION:\nMatthias Wenzel has reported a vulnerability in AVM Fritz!Box 7050,\nwhich can be exploited by malicious people to cause a DoS (Denial of\nService). \n\nThe vulnerability is caused due to an error within the handling of\ncertain UDP packets. \n\nSOLUTION:\nUse another device. \n\nPROVIDED AND/OR DISCOVERED BY:\nMatthias Wenzel\n\nORIGINAL ADVISORY:\nhttp://mazzoo.de/blog/2007/01/18#FritzBox_DoS\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "PACKETSTORM",
        "id": "53817"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-0431",
        "trust": 2.4
      },
      {
        "db": "BID",
        "id": "22130",
        "trust": 1.9
      },
      {
        "db": "SECUNIA",
        "id": "23868",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-0272",
        "trust": 1.6
      },
      {
        "db": "OSVDB",
        "id": "32940",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "31633",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20070119 DOS AGAINST AVM FRITZ!BOX 7050 (AND OTHERS)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20070119 DOS AGAINST AVM FRITZ!BOX 7050 (AND OTHERS)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20070123 RE: DOS AGAINST AVM FRITZ!BOX 7050 (AND OTHERS)",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "53817",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "PACKETSTORM",
        "id": "53817"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      }
    ]
  },
  "id": "VAR-200701-0211",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.4861111
  },
  "last_update_date": "2025-04-10T23:23:45.259000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.avm.de/en/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "http://mazzoo.de/blog/2007/01/18#fritzbox_dos"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/22130"
      },
      {
        "trust": 1.6,
        "url": "http://osvdb.org/32940"
      },
      {
        "trust": 1.6,
        "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/23868"
      },
      {
        "trust": 1.6,
        "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2007/0272"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
      },
      {
        "trust": 1.0,
        "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
      },
      {
        "trust": 1.0,
        "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0431"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0431"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/457406/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/31633"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/457829/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2007/0272"
      },
      {
        "trust": 0.3,
        "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/"
      },
      {
        "trust": 0.3,
        "url": "http://www.avm.de/en/"
      },
      {
        "trust": 0.3,
        "url": "http://www.avm.de/de/produkte/fritzbox/index.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/457406"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/457829"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/23868/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/software_inspector/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13298/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "PACKETSTORM",
        "id": "53817"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "db": "PACKETSTORM",
        "id": "53817"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0431"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-01-19T00:00:00",
        "db": "BID",
        "id": "22130"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "date": "2007-01-22T15:23:39",
        "db": "PACKETSTORM",
        "id": "53817"
      },
      {
        "date": "2007-01-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      },
      {
        "date": "2007-01-23T02:28:00",
        "db": "NVD",
        "id": "CVE-2007-0431"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-01-25T16:28:00",
        "db": "BID",
        "id": "22130"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001431"
      },
      {
        "date": "2007-01-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      },
      {
        "date": "2025-04-09T00:30:58.490000",
        "db": "NVD",
        "id": "CVE-2007-0431"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "AVM FRITZ!Box VoIP Remote Denial of Service Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "22130"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200701-379"
      }
    ],
    "trust": 0.6
  }
}

CVE-2007-0431 (GCVE-0-2007-0431)

Vulnerability from nvd – Published: 2007-01-23 02:00 – Updated: 2024-08-07 12:19
VLAI?
Summary
AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060).
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:19:30.187Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
          },
          {
            "name": "22130",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22130"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
          },
          {
            "name": "23868",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23868"
          },
          {
            "name": "ADV-2007-0272",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0272"
          },
          {
            "name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
          },
          {
            "name": "fritzbox-udp-packet-dos(31633)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
          },
          {
            "name": "32940",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/32940"
          },
          {
            "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-01-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
        },
        {
          "name": "22130",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22130"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
        },
        {
          "name": "23868",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23868"
        },
        {
          "name": "ADV-2007-0272",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0272"
        },
        {
          "name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
        },
        {
          "name": "fritzbox-udp-packet-dos(31633)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
        },
        {
          "name": "32940",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/32940"
        },
        {
          "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0431",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
            },
            {
              "name": "22130",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22130"
            },
            {
              "name": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS",
              "refsource": "MISC",
              "url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
            },
            {
              "name": "23868",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23868"
            },
            {
              "name": "ADV-2007-0272",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0272"
            },
            {
              "name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
            },
            {
              "name": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
            },
            {
              "name": "fritzbox-udp-packet-dos(31633)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
            },
            {
              "name": "32940",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/32940"
            },
            {
              "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0431",
    "datePublished": "2007-01-23T02:00:00",
    "dateReserved": "2007-01-22T00:00:00",
    "dateUpdated": "2024-08-07T12:19:30.187Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-0431 (GCVE-0-2007-0431)

Vulnerability from cvelistv5 – Published: 2007-01-23 02:00 – Updated: 2024-08-07 12:19
VLAI?
Summary
AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060).
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:19:30.187Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
          },
          {
            "name": "22130",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22130"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
          },
          {
            "name": "23868",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23868"
          },
          {
            "name": "ADV-2007-0272",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0272"
          },
          {
            "name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
          },
          {
            "name": "fritzbox-udp-packet-dos(31633)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
          },
          {
            "name": "32940",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/32940"
          },
          {
            "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-01-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
        },
        {
          "name": "22130",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22130"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
        },
        {
          "name": "23868",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23868"
        },
        {
          "name": "ADV-2007-0272",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0272"
        },
        {
          "name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
        },
        {
          "name": "fritzbox-udp-packet-dos(31633)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
        },
        {
          "name": "32940",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/32940"
        },
        {
          "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0431",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0387.html"
            },
            {
              "name": "22130",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22130"
            },
            {
              "name": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS",
              "refsource": "MISC",
              "url": "http://mazzoo.de/blog/2007/01/18#FritzBox_DoS"
            },
            {
              "name": "23868",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23868"
            },
            {
              "name": "ADV-2007-0272",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0272"
            },
            {
              "name": "20070123 Re: DoS against AVM Fritz!Box 7050 (and others)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/457829/100/0/threaded"
            },
            {
              "name": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/info.txt"
            },
            {
              "name": "fritzbox-udp-packet-dos(31633)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31633"
            },
            {
              "name": "32940",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/32940"
            },
            {
              "name": "20070119 DoS against AVM Fritz!Box 7050 (and others)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/457406/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0431",
    "datePublished": "2007-01-23T02:00:00",
    "dateReserved": "2007-01-22T00:00:00",
    "dateUpdated": "2024-08-07T12:19:30.187Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}