ID
VAR-E-201412-0380
CVE
cve_id: | CVE-2014-7256 | Trust: 0.3 |
TITLE
SEIL Series Routers CVE-2014-7256 Multiple Denial of Service Vulnerabilities
Trust: 0.3
DESCRIPTION
SEIL Series Routers are prone to multiple remote denial-of-service vulnerabilities.
An attacker can exploit these issues to cause an affected device to reload, denying service to legitimate users.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 3.75 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 3.12 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 3.11 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.52 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.51 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.50 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.49 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.48 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.47 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.46 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.45 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.44 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.43 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.42 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.41 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.40 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.30 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 1.00 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 3.75 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 3.12 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 3.11 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.52 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.51 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.50 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.49 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.48 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.47 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.46 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.45 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.44 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.43 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.42 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.41 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.40 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.30 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 1.00 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 3.75 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 3.12 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 3.11 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 2.60 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 2.52 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 2.51 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 2.50 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 2.48 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 2.30 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 1.00 | Trust: 0.3 |
EXPLOIT
To exploit these issues attackers can use readily available utilities.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Failure to Handle Exceptional Conditions
Trust: 0.3
CREDITS
The vendor reported these issues.
Trust: 0.3
EXTERNAL IDS
db: | JVN | id: | JVN04895240 | Trust: 0.3 |
db: | NVD | id: | CVE-2014-7256 | Trust: 0.3 |
db: | BID | id: | 71385 | Trust: 0.3 |
REFERENCES
url: | http://jvn.jp/en/jp/jvn04895240/index.html | Trust: 0.3 |
url: | http://www.seil.jp/ | Trust: 0.3 |
SOURCES
db: | BID | id: | 71385 |
LAST UPDATE DATE
2022-07-27T09:45:04.418000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 71385 | date: | 2014-12-01T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 71385 | date: | 2014-12-01T00:00:00 |