ID

VAR-200908-0149


CVE

CVE-2008-7065


TITLE

Siemens C450 IP Such VoIP Service disruption on devices (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2009-005674

DESCRIPTION

Siemens C450 IP and C475 IP VoIP devices allow remote attackers to cause a denial of service (disconnected calls and device reboot) via a crafted SIP packet to UDP port 5060. A remote attacker may exploit this issue to cause vulnerable devices to drop all current calls and reboot, resulting in a denial-of-service condition. Both Siemens C450IP and C475IP are popular VOIP phone devices. There is a loophole in the device processing malformed request data. ---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: Siemens C450IP / C475IP Denial of Service Vulnerability SECUNIA ADVISORY ID: SA32827 VERIFY ADVISORY: http://secunia.com/advisories/32827/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Siemens C450IP http://secunia.com/advisories/product/20611/ Siemens C475IP http://secunia.com/advisories/product/20612/ DESCRIPTION: A vulnerability has been reported in Siemens C450IP / C475IP, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the processing of SIP messages. SOLUTION: Restrict network access to the device. PROVIDED AND/OR DISCOVERED BY: sky & Any ORIGINAL ADVISORY: http://milw0rm.com/exploits/7220 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-7065 // JVNDB: JVNDB-2009-005674 // BID: 32451 // VULHUB: VHN-37190 // PACKETSTORM: 72351

AFFECTED PRODUCTS

vendor:siemensmodel:gigaset c475 ipscope:eqversion: -

Trust: 1.6

vendor:siemensmodel:gigaset c450 ipscope:eqversion: -

Trust: 1.6

vendor:siemensmodel:gigaset c450 ipscope: - version: -

Trust: 0.8

vendor:siemensmodel:gigaset c475 ipscope: - version: -

Trust: 0.8

vendor:siemensmodel:gigaset c475 ipscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:gigaset c450 ipscope:eqversion:0

Trust: 0.3

sources: BID: 32451 // JVNDB: JVNDB-2009-005674 // CNNVD: CNNVD-200908-384 // NVD: CVE-2008-7065

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-7065
value: HIGH

Trust: 1.0

NVD: CVE-2008-7065
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200908-384
value: HIGH

Trust: 0.6

VULHUB: VHN-37190
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-7065
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-37190
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-37190 // JVNDB: JVNDB-2009-005674 // CNNVD: CNNVD-200908-384 // NVD: CVE-2008-7065

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2009-005674 // NVD: CVE-2008-7065

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200908-384

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200908-384

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-005674

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-37190

PATCH

title:Top Pageurl:http://gigaset.com/

Trust: 0.8

sources: JVNDB: JVNDB-2009-005674

EXTERNAL IDS

db:NVDid:CVE-2008-7065

Trust: 2.8

db:BIDid:32451

Trust: 2.0

db:SECUNIAid:32827

Trust: 1.9

db:EXPLOIT-DBid:7220

Trust: 1.8

db:OSVDBid:50274

Trust: 1.7

db:JVNDBid:JVNDB-2009-005674

Trust: 0.8

db:CNNVDid:CNNVD-200908-384

Trust: 0.7

db:XFid:46820

Trust: 0.6

db:MILW0RMid:7220

Trust: 0.6

db:BUGTRAQid:20081124 SIEMENS C450IP/C475IP DOS

Trust: 0.6

db:VULHUBid:VHN-37190

Trust: 0.1

db:PACKETSTORMid:72351

Trust: 0.1

sources: VULHUB: VHN-37190 // BID: 32451 // JVNDB: JVNDB-2009-005674 // PACKETSTORM: 72351 // CNNVD: CNNVD-200908-384 // NVD: CVE-2008-7065

REFERENCES

url:http://www.securityfocus.com/bid/32451

Trust: 1.7

url:http://osvdb.org/50274

Trust: 1.7

url:http://secunia.com/advisories/32827

Trust: 1.7

url:http://www.securityfocus.com/archive/1/498599/100/0/threaded

Trust: 1.1

url:https://www.exploit-db.com/exploits/7220

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/46820

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-7065

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-7065

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/46820

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/498599/100/0/threaded

Trust: 0.6

url:http://www.milw0rm.com/exploits/7220

Trust: 0.6

url:http://gigaset.com/shc/0,1935,hq_en_0_122378_rarnrnrnrn,00.html

Trust: 0.3

url:http://gigaset.com/shc/0,1935,hq_en_0_145533_rarnrnrnrn_pagetype%253adescription,00.html

Trust: 0.3

url:/archive/1/498599

Trust: 0.3

url:http://secunia.com/advisories/product/20612/

Trust: 0.1

url:http://milw0rm.com/exploits/7220

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/advisories/32827/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/product/20611/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-37190 // BID: 32451 // JVNDB: JVNDB-2009-005674 // PACKETSTORM: 72351 // CNNVD: CNNVD-200908-384 // NVD: CVE-2008-7065

CREDITS

Martin Kluge

Trust: 0.9

sources: BID: 32451 // CNNVD: CNNVD-200908-384

SOURCES

db:VULHUBid:VHN-37190
db:BIDid:32451
db:JVNDBid:JVNDB-2009-005674
db:PACKETSTORMid:72351
db:CNNVDid:CNNVD-200908-384
db:NVDid:CVE-2008-7065

LAST UPDATE DATE

2025-04-10T23:18:51.922000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-37190date:2018-10-11T00:00:00
db:BIDid:32451date:2015-05-07T17:20:00
db:JVNDBid:JVNDB-2009-005674date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200908-384date:2009-08-25T00:00:00
db:NVDid:CVE-2008-7065date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-37190date:2009-08-25T00:00:00
db:BIDid:32451date:2008-11-24T00:00:00
db:JVNDBid:JVNDB-2009-005674date:2012-12-20T00:00:00
db:PACKETSTORMid:72351date:2008-11-28T17:07:12
db:CNNVDid:CNNVD-200908-384date:2008-11-24T00:00:00
db:NVDid:CVE-2008-7065date:2009-08-25T10:30:00.297