Lucene search

K
openvasCopyright (C) 2018 Greenbone AGOPENVAS:1361412562310108463
HistorySep 16, 2018 - 12:00 a.m.

Multiple AVM FRITZ!Box VoIP Remote Denial of Service Vulnerability

2018-09-1600:00:00
Copyright (C) 2018 Greenbone AG
plugins.openvas.org
10

6.8 Medium

AI Score

Confidence

Low

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.093 Low

EPSS

Percentile

94.7%

Multiple AVM FRITZ!Box devices are prone to a Denial of Service.

# SPDX-FileCopyrightText: 2018 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/o:avm:fritz%21_os";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.108463");
  script_version("2023-07-20T05:05:17+0000");
  script_cve_id("CVE-2007-0431");
  script_name("Multiple AVM FRITZ!Box VoIP Remote Denial of Service Vulnerability");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_tag(name:"last_modification", value:"2023-07-20 05:05:17 +0000 (Thu, 20 Jul 2023)");
  script_tag(name:"creation_date", value:"2018-09-16 17:38:23 +0200 (Sun, 16 Sep 2018)");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_copyright("Copyright (C) 2018 Greenbone AG");
  script_dependencies("gb_avm_fritz_box_detect.nasl");
  script_mandatory_keys("avm/fritz/model", "avm/fritz/firmware_version");

  script_xref(name:"URL", value:"https://web.archive.org/web/20160308013152/http://mazzoo.de/blog/2007/01/18");
  script_xref(name:"URL", value:"https://www.securityfocus.com/archive/1/457406/30/0/threaded");

  script_tag(name:"summary", value:"Multiple AVM FRITZ!Box devices are prone to a Denial of Service.");

  script_tag(name:"insight", value:"Sending a zero-length UDP packet to port 5060 (SIP) of a AVM FRITZ!Box will
  crash the VoIP-telephony application. This works from any IP-interface, including the DSL line.");

  script_tag(name:"impact", value:"A remote attacker might be able to crash the VoIP-telephony application.");

  script_tag(name:"vuldetect", value:"Check the AVM FRITZ!OS version.");

  script_tag(name:"solution", value:"Updates are available. Please see the references or the script output
  on the available updates for the matching model.");

  script_tag(name:"qod_type", value:"remote_banner");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("version_func.inc");
include("host_details.inc");

if( ! fw_version = get_app_version( cpe:CPE, nofork:TRUE ) ) exit( 0 );
if( ! model = get_kb_item( "avm/fritz/model" ) ) exit( 0 );

# nb: There is no "full" list available on the affected/fixed versions
# and models. The list below was gathered from various online resources.
fixes = make_array("5010", "4.27",
                   "5012", "4.27",
                   "5050", "4.26",
                   "7050", "4.26");

if( ! fixes[model] ) exit( 99 );
patch = fixes[model];

if( version_is_less( version:fw_version, test_version:patch ) ) {
  report  = 'Model:              ' + model + '\n';
  report += 'Installed Firmware: ' + fw_version + '\n';
  report += 'Fixed Firmware:     ' + patch;
  security_message( port:0, data:report );
  exit( 0 );
}

exit( 99 );

6.8 Medium

AI Score

Confidence

Low

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.093 Low

EPSS

Percentile

94.7%

Related for OPENVAS:1361412562310108463