CVE-2004-1597
Summary
| CVE | CVE-2004-1597 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2004-10-13 04:00:00 UTC |
| Updated | 2023-11-07 01:56:00 UTC |
| Description | RIM Blackberry 7230 running RIM Blackberry OS 3.7 SP1 allows remote attackers to cause a denial of service (device reboot and possibly data corruption) via a calendar message with a long Location field, which triggers a watchdog while the message is being stored. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Rim | Blackberry | 7230_3.7.1_.41 | All | All | All |
| Application | Rim | Blackberry | 7230_3.7.1_.41 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| '[HV-MED] UPDATE: RIM Blackberry DoS, data loss' - MARC | BUGTRAQ | marc.info | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| [Full-Disclosure] [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss | FULLDISC | lists.grok.org.uk | Exploit, Vendor Advisory |
| Research In Motion Blackberry Remote Denial of Service Vulnerability | BID | www.securityfocus.com | Patch, Vendor Advisory |
| www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/... | www.blackberry.com | ||
| Secunia - Advisories - RIM Blackberry Meeting Request Message "Location" Header Denial of Service | SECUNIA | secunia.com | Patch, Vendor Advisory |
| www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/... | CONFIRM | www.blackberry.com | Exploit, Patch, Vendor Advisory |
| '[HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss' - MARC | BUGTRAQ | marc.info | |
| 404 Not Found | MISC | www.hexview.com | Exploit, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.