mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
114 lines
3.7 KiB
JSON
114 lines
3.7 KiB
JSON
{
|
|
"id": "CVE-2007-5469",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-10-16T00:17:00.000",
|
|
"lastModified": "2024-08-07T16:15:28.080",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [
|
|
{
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"tags": [
|
|
"disputed"
|
|
]
|
|
}
|
|
],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "OpenSER 1.2.2 does not verify the Digest authentication header URI against the Request URI in SIP messages, which allows remote attackers to use sniffed Digest authentication credentials to call arbitrary telephone numbers or spoof caller ID (aka \"toll fraud and authentication forward attack\"). NOTE: Debian disputes this issue, stating that \"having the two URIs mismatch is allowed by the standard and happens in some setups for valid reasons."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "** EN DISPUTA ** OpenSER versi\u00f3n 1.2.2 no verifica el URI de cabecera de autenticaci\u00f3n de resumen contra la URI de petici\u00f3n en mensajes SIP, lo cual permite a atacantes remotos utilizar credenciales de autenticaci\u00f3n de resumen rastreadas para invocar n\u00fameros de tel\u00e9fono de su elecci\u00f3n o suplantar el identificador del emisor (tambi\u00e9n conocido como \"fraude de aduana y ataque de reenv\u00edo de autenticaci\u00f3n\"). NOTA: Debian impugna este asunto, bas\u00e1ndose en que \" Tener las dos URIs mal emparejadas est\u00e1 permitido por norma y que ocurre en algunas configuraciones, por causas justificadas.\""
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:openser:openser:1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "482320A0-F065-442E-BFB4-2DD51A6DE1B0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446956",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066581.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066691.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066694.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/27204",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/26057",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37197",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |