ID
VAR-201012-0372
TITLE
Multiple Time Security Vulnerabilities in Apple Time Capsule/AirPort Base Station
Trust: 0.6
DESCRIPTION
Apple Time Capsule is a wireless attached storage device that combines wireless built-in gateway routing from Apple. Apple AirPort Extreme is a wireless solution for home, school and small businesses. Apple Time Capsule and AirPort Base Station have multiple remote security vulnerabilities that an attacker can use to bypass certain security restrictions and cause a denial of service. Other attacks are also possible. This BID is being retired
Trust: 0.81
IOT TAXONOMY
category: | ['Network device'] | sub_category: | - | Trust: 0.6 |
AFFECTED PRODUCTS
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.5 | Trust: 0.9 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.4.2 | Trust: 0.9 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.4.1 | Trust: 0.9 |
vendor: | apple | model: | airport base station with 802.11n | scope: | eq | version: | 7.4.1 | Trust: 0.6 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.4.2 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.3.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.2.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.7 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 5.5 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.5 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | apple | model: | airport extreme base station with 802.11n | scope: | eq | version: | 7.4.1 | Trust: 0.3 |
vendor: | apple | model: | airport extreme base station | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | airport extreme | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | airport express base station with 802.11n | scope: | eq | version: | 7.4.1 | Trust: 0.3 |
vendor: | apple | model: | airport express | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | ne | version: | 7.5.2 | Trust: 0.3 |
vendor: | apple | model: | airport extreme base station with 802.11n | scope: | ne | version: | 7.5.2 | Trust: 0.3 |
vendor: | apple | model: | airport express base station with 802.11n | scope: | ne | version: | 7.5.2 | Trust: 0.3 |
THREAT TYPE
network
Trust: 0.3
TYPE
Unknown
Trust: 0.3
PATCH
title: | Apple Time Capsule and AirPort Base Station patches for multiple remote security vulnerabilities | url: | https://www.cnvd.org.cn/patchinfo/show/2370 | Trust: 0.6 |
EXTERNAL IDS
db: | BID | id: | 45466 | Trust: 0.9 |
db: | CNVD | id: | CNVD-2010-3352 | Trust: 0.6 |
REFERENCES
url: | http://www.securityfocus.com/bid/45466 | Trust: 0.6 |
url: | http://www.apple.com | Trust: 0.3 |
CREDITS
Shoichi Sakane of the KAME project, Kanai Akira of Internet Multifeed, Co., Shirahata Shin and Rodney Van Meter of Keio University, Tatuya Jinmei of Internet Systems Consortium, Inc., Sabahattin Gucukoglu, and Stefan R. Filipek
Trust: 0.3
SOURCES
db: | CNVD | id: | CNVD-2010-3352 |
db: | BID | id: | 45466 |
LAST UPDATE DATE
2022-05-17T02:04:47.207000+00:00
SOURCES UPDATE DATE
db: | CNVD | id: | CNVD-2010-3352 | date: | 2010-12-23T00:00:00 |
db: | BID | id: | 45466 | date: | 2010-12-17T20:34:00 |
SOURCES RELEASE DATE
db: | CNVD | id: | CNVD-2010-3352 | date: | 2010-12-23T00:00:00 |
db: | BID | id: | 45466 | date: | 2010-12-16T00:00:00 |