ID

VAR-200709-0415


CVE

CVE-2007-4753


TITLE

Thomson ST 2030 SIP Service disruption on telephones (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-006071

DESCRIPTION

The Thomson ST 2030 SIP phone with software 1.52.1 allows remote attackers to cause a denial of service (device hang) via (1) an empty SIP message or (2) a SIP INVITE message with a malformed To header, different vectors than CVE-2007-4553. This vulnerability CVE-2007-4553 Is a different vulnerability.Denial of service by a third party via the following message ( Device hang ) There is a possibility of being put into a state. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Thomson SpeedTouch 2030 Denial of Service Vulnerability SECUNIA ADVISORY ID: SA26587 VERIFY ADVISORY: http://secunia.com/advisories/26587/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Thomson SpeedTouch 2030 VoIP Phone http://secunia.com/product/15497/ DESCRIPTION: A vulnerability has been reported in the Thomson SpeedTouch 2030 VoIP phone, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error in the handling of INVITE messages and can be exploited to crash the device by sending a specially crafted INVITE message containing a "/" character after the version in the "Via:" field. The vulnerability is reported in software version 1.52.1. Other versions may also be affected. SOLUTION: Use the device in a trusted network environment only. PROVIDED AND/OR DISCOVERED BY: Humberto J. Abdelnur, Radu State, and Olivier Festor ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065433.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-4753 // JVNDB: JVNDB-2007-006071 // BID: 85415 // VULHUB: VHN-28115 // PACKETSTORM: 58859

AFFECTED PRODUCTS

vendor:thomsonmodel:st 2030 sip phonescope:eqversion:1.52.1

Trust: 2.4

vendor:thomsonmodel:st sip phonescope:eqversion:20301.52.1

Trust: 0.3

sources: BID: 85415 // JVNDB: JVNDB-2007-006071 // CNNVD: CNNVD-200709-069 // NVD: CVE-2007-4753

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4753
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-4753
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200709-069
value: MEDIUM

Trust: 0.6

VULHUB: VHN-28115
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-4753
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-28115
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-28115 // JVNDB: JVNDB-2007-006071 // CNNVD: CNNVD-200709-069 // NVD: CVE-2007-4753

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2007-006071 // NVD: CVE-2007-4753

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200709-069

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200709-069

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-006071

PATCH

title:Top Pageurl:http://thomsonreuters.com/

Trust: 0.8

sources: JVNDB: JVNDB-2007-006071

EXTERNAL IDS

db:NVDid:CVE-2007-4753

Trust: 2.8

db:SECTRACKid:1018616

Trust: 2.0

db:SECTRACKid:1018611

Trust: 2.0

db:SREASONid:3104

Trust: 2.0

db:SECUNIAid:26587

Trust: 1.8

db:XFid:36286

Trust: 0.9

db:JVNDBid:JVNDB-2007-006071

Trust: 0.8

db:FULLDISCid:20070828 DOS VULNERABILITY ON THOMSON SIP PHONE ST 2030 USING AN EMPTY PACKET

Trust: 0.6

db:FULLDISCid:20070827 DOS VULNERABILITY ON THOMSON SIP PHONE ST 2030 USING THE TO HEADER

Trust: 0.6

db:CNNVDid:CNNVD-200709-069

Trust: 0.6

db:BIDid:85415

Trust: 0.4

db:VULHUBid:VHN-28115

Trust: 0.1

db:PACKETSTORMid:58859

Trust: 0.1

sources: VULHUB: VHN-28115 // BID: 85415 // JVNDB: JVNDB-2007-006071 // PACKETSTORM: 58859 // CNNVD: CNNVD-200709-069 // NVD: CVE-2007-4753

REFERENCES

url:http://lists.grok.org.uk/pipermail/full-disclosure/2007-august/065458.html

Trust: 2.0

url:http://lists.grok.org.uk/pipermail/full-disclosure/2007-august/065478.html

Trust: 2.0

url:http://securitytracker.com/id?1018611

Trust: 2.0

url:http://securitytracker.com/id?1018616

Trust: 2.0

url:http://securityreason.com/securityalert/3104

Trust: 2.0

url:http://secunia.com/advisories/26587

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/36286

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/36286

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4753

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4753

Trust: 0.8

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/26587/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://lists.grok.org.uk/pipermail/full-disclosure/2007-august/065433.html

Trust: 0.1

url:http://secunia.com/product/15497/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-28115 // BID: 85415 // JVNDB: JVNDB-2007-006071 // PACKETSTORM: 58859 // CNNVD: CNNVD-200709-069 // NVD: CVE-2007-4753

CREDITS

Unknown

Trust: 0.3

sources: BID: 85415

SOURCES

db:VULHUBid:VHN-28115
db:BIDid:85415
db:JVNDBid:JVNDB-2007-006071
db:PACKETSTORMid:58859
db:CNNVDid:CNNVD-200709-069
db:NVDid:CVE-2007-4753

LAST UPDATE DATE

2025-04-10T23:11:35.165000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-28115date:2017-07-29T00:00:00
db:BIDid:85415date:2007-09-07T00:00:00
db:JVNDBid:JVNDB-2007-006071date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200709-069date:2007-09-11T00:00:00
db:NVDid:CVE-2007-4753date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-28115date:2007-09-08T00:00:00
db:BIDid:85415date:2007-09-07T00:00:00
db:JVNDBid:JVNDB-2007-006071date:2012-12-20T00:00:00
db:PACKETSTORMid:58859date:2007-08-27T15:28:28
db:CNNVDid:CNNVD-200709-069date:2007-09-07T00:00:00
db:NVDid:CVE-2007-4753date:2007-09-08T00:17:00