var-200703-0565
Vulnerability from variot

Buffer overflow in D-Link TFTP Server 1.0 allows remote attackers to cause a denial of service (crash) via a long (1) GET or (2) PUT request, which triggers memory corruption. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. D-Link TFTP Server is a TFTP service program built into D-Link wireless AP. D-Link TFTP Server has a vulnerability in processing malformed TFTP access requests, and remote attackers may use this vulnerability to control the server. Test code: http://www.securityfocus.com/data/vulnerabilities/exploits/22923.rb Patching plan: The vendor has not released upgrade patches for the time being, please pay attention to the vendor address in time: http://www.dlink.com. D-Link TFTP is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before storing it in a finite-sized buffer. Given the nature of this issue, the attacker may presumably be able to execute code. D-Link TFTP 1.0 is vulnerable; other versions may also be affected.


Want a new job? http://secunia.com/secunia_vacancies/

Secunia is looking for new researchers with a reversing background and experience in writing exploit code: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ http://secunia.com/Disassembling_og_Reversing/


TITLE: D-Link TFTP Server Data Handling Memory Corruption

SECUNIA ADVISORY ID: SA24360

VERIFY ADVISORY: http://secunia.com/advisories/24360/

CRITICAL: Moderately critical

IMPACT: System access

WHERE:

From local network

SOFTWARE: D-Link TFTP Server 1.x http://secunia.com/product/13596/

DESCRIPTION: Parvez Anwar has discovered a vulnerability in D-Link TFTP Server, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to an error within the handling of received data. This can be exploited to corrupt certain structures in memory via an overly long (greater than 300 bytes), specially crafted GET or PUT request.

The vulnerability is confirmed in version 1.0.

SOLUTION: Use in a trusted network environment only.

PROVIDED AND/OR DISCOVERED BY: Parvez Anwar


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200703-0565",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "tftp server",
        "scope": "eq",
        "trust": 2.7,
        "vendor": "d link",
        "version": "1.0"
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.2,
        "vendor": "none",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2007-1848"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2007-1847"
      },
      {
        "db": "BID",
        "id": "22923"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001692"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-350"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1435"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:d-link:tftp_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001692"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Parvez Anwar",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-350"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2007-1435",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2007-1435",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-24797",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2007-1435",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-1435",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200703-350",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-24797",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24797"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001692"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-350"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1435"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in D-Link TFTP Server 1.0 allows remote attackers to cause a denial of service (crash) via a long (1) GET or (2) PUT request, which triggers memory corruption.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. D-Link TFTP Server is a TFTP service program built into D-Link wireless AP. D-Link TFTP Server has a vulnerability in processing malformed TFTP access requests, and remote attackers may use this vulnerability to control the server. Test code: http://www.securityfocus.com/data/vulnerabilities/exploits/22923.rb Patching plan: The vendor has not released upgrade patches for the time being, please pay attention to the vendor address in time: http://www.dlink.com. D-Link TFTP is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before storing it in a finite-sized buffer. Given the nature of this issue, the attacker may presumably be able to execute code. \nD-Link TFTP 1.0 is vulnerable; other versions may also be affected. \n\n----------------------------------------------------------------------\n\nWant a new job?\nhttp://secunia.com/secunia_vacancies/\n\nSecunia is looking for new researchers with a reversing background\nand experience in writing exploit code:\nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\nhttp://secunia.com/Disassembling_og_Reversing/\n\n----------------------------------------------------------------------\n\nTITLE:\nD-Link TFTP Server Data Handling Memory Corruption\n\nSECUNIA ADVISORY ID:\nSA24360\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/24360/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nD-Link TFTP Server 1.x\nhttp://secunia.com/product/13596/\n\nDESCRIPTION:\nParvez Anwar has discovered a vulnerability in D-Link TFTP Server,\nwhich can be exploited by malicious people to compromise a vulnerable\nsystem. \n\nThe vulnerability is caused due to an error within the handling of\nreceived data. This can be exploited to corrupt certain structures in\nmemory via an overly long (greater than 300 bytes), specially crafted\nGET or PUT request. \n\nThe vulnerability is confirmed in version 1.0. \n\nSOLUTION:\nUse in a trusted network environment only. \n\nPROVIDED AND/OR DISCOVERED BY:\nParvez Anwar\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1435"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001692"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2007-1848"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2007-1847"
      },
      {
        "db": "BID",
        "id": "22923"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24797"
      },
      {
        "db": "PACKETSTORM",
        "id": "54996"
      }
    ],
    "trust": 3.15
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-24797",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-24797"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-1435",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "22923",
        "trust": 2.6
      },
      {
        "db": "SECUNIA",
        "id": "24360",
        "trust": 2.4
      },
      {
        "db": "OSVDB",
        "id": "33977",
        "trust": 2.3
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001692",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2007-1848",
        "trust": 0.6
      },
      {
        "db": "CNCVE",
        "id": "CNCVE-20071435",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2007-1847",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-350",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "29735",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "16345",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-83218",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-70862",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "83123",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-24797",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "54996",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2007-1848"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2007-1847"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24797"
      },
      {
        "db": "BID",
        "id": "22923"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001692"
      },
      {
        "db": "PACKETSTORM",
        "id": "54996"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-350"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1435"
      }
    ]
  },
  "id": "VAR-200703-0565",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2007-1848"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2007-1847"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24797"
      }
    ],
    "trust": 0.13
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT"
        ],
        "sub_category": null,
        "trust": 1.2
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2007-1848"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2007-1847"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:24:14.981000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.dlink.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001692"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1435"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://osvdb.org/33977"
      },
      {
        "trust": 2.3,
        "url": "http://secunia.com/advisories/24360"
      },
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/22923"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1435"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1435"
      },
      {
        "trust": 0.3,
        "url": "http://www.dlink.com.sg/products/?pid=308"
      },
      {
        "trust": 0.3,
        "url": "http://www.d-link.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/24360/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/disassembling_og_reversing/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_vacancies/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13596/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2007-1847"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24797"
      },
      {
        "db": "BID",
        "id": "22923"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001692"
      },
      {
        "db": "PACKETSTORM",
        "id": "54996"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-350"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1435"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2007-1848"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2007-1847"
      },
      {
        "db": "VULHUB",
        "id": "VHN-24797"
      },
      {
        "db": "BID",
        "id": "22923"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001692"
      },
      {
        "db": "PACKETSTORM",
        "id": "54996"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-350"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1435"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-03-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2007-1848"
      },
      {
        "date": "2007-03-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2007-1847"
      },
      {
        "date": "2007-03-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-24797"
      },
      {
        "date": "2007-03-12T00:00:00",
        "db": "BID",
        "id": "22923"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001692"
      },
      {
        "date": "2007-03-13T00:30:19",
        "db": "PACKETSTORM",
        "id": "54996"
      },
      {
        "date": "2007-03-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200703-350"
      },
      {
        "date": "2007-03-13T19:19:00",
        "db": "NVD",
        "id": "CVE-2007-1435"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-03-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2007-1848"
      },
      {
        "date": "2007-03-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2007-1847"
      },
      {
        "date": "2008-11-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-24797"
      },
      {
        "date": "2015-05-12T19:29:00",
        "db": "BID",
        "id": "22923"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001692"
      },
      {
        "date": "2007-03-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200703-350"
      },
      {
        "date": "2024-11-21T00:28:18.243000",
        "db": "NVD",
        "id": "CVE-2007-1435"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-350"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "D-Link TFTP Server Vulnerable to buffer overflow",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001692"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200703-350"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…