4 results (0.017 seconds)

CVSS: 7.8EPSS: 1%CPEs: 9EXPL: 0

The Sony Ericsson W910i, W660i, K618i, K610i, Z610i, K810i, K660i, W880i, and K530i phones allow remote attackers to cause a denial of service (device reboot or hang-up) via a malformed WAP Push packet to (1) SMS or (2) UDP port 2948. Los teléfonos Sony Ericsson W910i, W660i, K618i, K610i, Z610i, K810i, K660i, W880i, y K530i permite a los atacantes remotos causar una denegación de servicios (el dispositivo se reinicia o cuelgue) a través de paquetes mal formados WAP Push para (1) SMS o (2) puerto UDP 2948. • http://secunia.com/advisories/33616 http://www.mseclab.com/index.php?page_id=123 http://www.securityfocus.com/archive/1/500382/100/0/threaded http://www.securityfocus.com/bid/33433 http://www.securitytracker.com/id?1021634 • CWE-20: Improper Input Validation •

CVSS: 3.3EPSS: 1%CPEs: 2EXPL: 0

The Sony Ericsson K700i and W810i phones allow remote attackers to cause a denial of service (continual modal dialogs and UI unavailability) by repeatedly trying to OBEX push a file over Bluetooth, as demonstrated by ussp-push. Los teléfonos Sony Ericsson K700i y W810i permite a atacantes remotos provocar una denegación de servicio (diálogos modales contínuos e indisponibilidad del interfaz de usuario) intentando repetidamente la transmisión OBEX de un archivo por Bluetooth, como ha sido demostrado por ussp-push. • http://securityreason.com/securityalert/2180 http://www.securityfocus.com/archive/1/457768/100/0/threaded http://www.securityfocus.com/archive/1/457797/100/0/threaded • CWE-20: Improper Input Validation •

CVSS: 2.9EPSS: 0%CPEs: 1EXPL: 0

The Bluetooth stack in the Sony Ericsson T60 does not properly implement "Limited discoverable" mode, which allows remote attackers to obtain unauthorized inquiry responses. La pila Bluetooth en el Sony Ericsson T60 no implementa adecuadamente el modo "visible limitadamente" (Limited discoverable mode), lo cual permite a atacantes remotos obtener respuestas no autorizadas a peticiones. • http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf http://osvdb.org/37585 http://www.securityfocus.com/archive/1/455889/100/0/threaded •

CVSS: 7.8EPSS: 17%CPEs: 4EXPL: 1

Buffer overflow in Sony Ericsson K600i, V600i, W800i, and T68i cell phone allows remote attackers to cause a denial of service (reboot or shutdown) through a wireless Bluetooth connection via a malformed Logical Link Control and Adaptation Protocol (L2CAP) packet whose length field is less than the actual length of the packet. Desbordamiento de búfer en teléfonos móviles Sony Ericsson K600i, V600i, W800i y T68i permite a atacantes remotos provocar una denegación de servicio (reinicio o apagado) a través de una conexión inalámbrica de Bluetooth a través de un paquete Logical Link Control and Adaptation Protocol (L2CAP) malformado cuya longitud de campo es menor que la longitud actual del paquete. • https://www.exploit-db.com/exploits/1473 http://marc.info/?l=bugtraq&m=113926179907655&w=2 http://marc.info/?l=full-disclosure&m=113924661724270&w=2 http://secunia.com/advisories/18747 http://www.secuobs.com/news/05022006-bluetooth7.shtml#english http://www.securityfocus.com/bid/16512 http://www.vupen.com/english/advisories/2006/0478 https://exchange.xforce.ibmcloud.com/vulnerabilities/24534 •