2024-12-08 03:06:42 +00:00

121 lines
3.5 KiB
JSON

{
"id": "CVE-2007-6095",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-11-22T00:46:00.000",
"lastModified": "2024-11-21T00:39:20.903",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SIP component in Ingate Firewall before 4.6.0 and SIParator before 4.6.0, when Remote NAT Traversal is employed, does not properly perform user registration and message distribution, which might allow remote authenticated users to receive messages intended for other users."
},
{
"lang": "es",
"value": "El componente SIP en Ingate Firewall anterior a 4.6.0 y SIParator anterior a 4.6.0, cuando se emplea el NAT Transversal Remoto, no lleva adecuadamente a cabo el registro de usuarios ni la distribuci\u00f3n de mensajes, lo cual podr\u00eda permitir a usuarios remotos autenticados recibir mensajes destinados a otros usuarios."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:ingate:ingate_firewall:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.5.2",
"matchCriteriaId": "2FCD0134-18A5-4C85-B6D3-6E66A8983C43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:ingate:ingate_siparator:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.5.2",
"matchCriteriaId": "598B6EC9-AF61-4C65-AE23-FC8F42CE64B1"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/42172",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/27688",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.ingate.com/relnote-460.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/26486",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/42172",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/27688",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.ingate.com/relnote-460.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/26486",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}