ID

VAR-200708-0292


CVE

CVE-2007-4498


TITLE

Grandstream SIP Phone GXV 3000 Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-002547

DESCRIPTION

The Grandstream SIP Phone GXV-3000 with firmware 1.0.1.7, Loader 1.0.0.6, and Boot 1.0.0.18 allows remote attackers to force silent call completion, eavesdrop on the phone's local environment, and cause a denial of service (blocked call reception) via a certain SIP INVITE message followed by a certain "SIP/2.0 183 Session Progress" message. \"GXV-3000是潮流科技(Grandstream)基于SIP和H.264标准的下一代高级IP视频电话. GXV-3000在处理特定的消息序列时存在漏洞,远程攻击者可能利用此漏洞导致设备不可用. 如果向GXV-3000电话发送了以下两个消息序列的话,就会导致设备拒绝服务: X ----------------------- INVITE -------------------> GXV-3000 X <------------------ 100 Trying ----------------- GXV-3000 X <--------------- 180 Ringing ------------------- GXV-3000 X ------------- 183 Session Progress -------> GXV-3000 X <-----------RTP - FLOW ------------------------ GXV-3000 \". Grandstream GXV-3000 phones are prone to a remote denial-of-service vulnerability. Exploiting this issue allows remote attackers to cause the device to accept a phone while being unable to hang up. This effectively denies service to legitimate users because further calls will not be accepted by the device. "GXV-3000 is Grandstream's next-generation advanced IP video phone based on SIP and H.264 standards. GXV-3000 has a vulnerability when processing a specific message sequence. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Grandstream GXV3000 Eavesdropping and Denial of Service Vulnerability SECUNIA ADVISORY ID: SA26568 VERIFY ADVISORY: http://secunia.com/advisories/26568/ CRITICAL: Moderately critical IMPACT: Security Bypass, Exposure of sensitive information, DoS WHERE: >From remote OPERATING SYSTEM: Grandstream GXV3000 IP Video Phone http://secunia.com/product/15436/ DESCRIPTION: A vulnerability has been reported in the Grandstream GXV3000 IP Video Phone, which can be exploited by malicious people to cause a DoS (Denial of Service) and eavesdrop with vulnerable devices. The vulnerability is reported in firmware version 1.0.1.7. Other versions may also be affected. SOLUTION: Reportedly fixed in version 1.0.1.12. Contact the vendor for more information. PROVIDED AND/OR DISCOVERED BY: Humberto J. Abdelnur, Radu State, and Olivier Festor ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065417.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2007-4498 // JVNDB: JVNDB-2007-002547 // CNNVD: CNNVD-200708-394 // BID: 25399 // VULHUB: VHN-27860 // PACKETSTORM: 58842

AFFECTED PRODUCTS

vendor:grandstreammodel:sip phonescope:eqversion:gxv-3000

Trust: 1.6

vendor:grandstreammodel:sip phonescope:eqversion:gxv-3000 boot 1.0.0.18

Trust: 0.8

vendor:grandstreammodel:sip phonescope:eqversion:loader 1.0.0.6

Trust: 0.8

vendor:grandstreammodel:sip phonescope:eqversion:firmware 1.0.1.7

Trust: 0.8

vendor:grandstreammodel:gxv-3000scope:eqversion:0

Trust: 0.3

sources: BID: 25399 // JVNDB: JVNDB-2007-002547 // CNNVD: CNNVD-200708-394 // NVD: CVE-2007-4498

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4498
value: HIGH

Trust: 1.0

NVD: CVE-2007-4498
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200708-394
value: HIGH

Trust: 0.6

VULHUB: VHN-27860
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-4498
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27860
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27860 // JVNDB: JVNDB-2007-002547 // CNNVD: CNNVD-200708-394 // NVD: CVE-2007-4498

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-4498

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200708-394

TYPE

Design Error

Trust: 0.9

sources: BID: 25399 // CNNVD: CNNVD-200708-394

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-002547

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-27860

PATCH

title:Top Pageurl:http://www.grandstream.com/

Trust: 0.8

sources: JVNDB: JVNDB-2007-002547

EXTERNAL IDS

db:NVDid:CVE-2007-4498

Trust: 2.8

db:BIDid:25399

Trust: 2.0

db:SECUNIAid:26568

Trust: 1.8

db:OSVDBid:40185

Trust: 1.7

db:SREASONid:3059

Trust: 1.7

db:SECTRACKid:1018598

Trust: 1.7

db:VUPENid:ADV-2007-2970

Trust: 1.7

db:JVNDBid:JVNDB-2007-002547

Trust: 0.8

db:XFid:36170

Trust: 0.6

db:FULLDISCid:20070822 REMOTE EAVESDROPPING WITH SIP PHONE GXV-3000

Trust: 0.6

db:CNNVDid:CNNVD-200708-394

Trust: 0.6

db:SEEBUGid:SSVID-83900

Trust: 0.1

db:EXPLOIT-DBid:30517

Trust: 0.1

db:VULHUBid:VHN-27860

Trust: 0.1

db:PACKETSTORMid:58842

Trust: 0.1

sources: VULHUB: VHN-27860 // BID: 25399 // JVNDB: JVNDB-2007-002547 // PACKETSTORM: 58842 // CNNVD: CNNVD-200708-394 // NVD: CVE-2007-4498

REFERENCES

url:http://lists.grok.org.uk/pipermail/full-disclosure/2007-august/065417.html

Trust: 1.8

url:http://www.securityfocus.com/bid/25399

Trust: 1.7

url:http://osvdb.org/40185

Trust: 1.7

url:http://www.securitytracker.com/id?1018598

Trust: 1.7

url:http://secunia.com/advisories/26568

Trust: 1.7

url:http://securityreason.com/securityalert/3059

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/2970

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/36170

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4498

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4498

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/36170

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/2970

Trust: 0.6

url:http://www.grandstream.com/gxv3000.html

Trust: 0.3

url:http://secunia.com/product/15436/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/26568/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-27860 // BID: 25399 // JVNDB: JVNDB-2007-002547 // PACKETSTORM: 58842 // CNNVD: CNNVD-200708-394 // NVD: CVE-2007-4498

CREDITS

Radu State※ state@loria.fr

Trust: 0.6

sources: CNNVD: CNNVD-200708-394

SOURCES

db:VULHUBid:VHN-27860
db:BIDid:25399
db:JVNDBid:JVNDB-2007-002547
db:PACKETSTORMid:58842
db:CNNVDid:CNNVD-200708-394
db:NVDid:CVE-2007-4498

LAST UPDATE DATE

2025-04-10T23:05:34.858000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27860date:2017-07-29T00:00:00
db:BIDid:25399date:2015-05-07T17:35:00
db:JVNDBid:JVNDB-2007-002547date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200708-394date:2007-08-27T00:00:00
db:NVDid:CVE-2007-4498date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-27860date:2007-08-23T00:00:00
db:BIDid:25399date:2007-08-22T00:00:00
db:JVNDBid:JVNDB-2007-002547date:2012-06-26T00:00:00
db:PACKETSTORMid:58842date:2007-08-25T19:10:39
db:CNNVDid:CNNVD-200708-394date:2007-08-23T00:00:00
db:NVDid:CVE-2007-4498date:2007-08-23T19:17:00