ID

VAR-201103-0115


CVE

CVE-2011-0454


TITLE

SEIL Multiple Products PPP Access Concentrator (PPPAC) Buffer Overflow Vulnerability

Trust: 0.9

sources: CNVD: CNVD-2011-0817 // BID: 46598

DESCRIPTION

Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet. SEIL Series routers contain a buffer overflow vulnerability. Accoding to the developer, all versions of SEIL/86, SEIL/B1, SEIL/X1, SEIL/X2 3.00 through 3.11 process PPPoE packets in a non-administrative mode of operation, therefore the affect of this vulnerability is limited to the PPPAC service being stopped. A security vulnerability exists in the SEIL router that allows malicious users to compromise the target system. Sending a specially crafted message can execute arbitrary code in the context of the application. Multiple SEIL products, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. SEIL Router is a router produced by Japanese SEIL manufacturer. ---------------------------------------------------------------------- Meet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March). http://secunia.com/company/events/mms_2011/ ---------------------------------------------------------------------- TITLE: SEIL Routers PPP Access Concentrator Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA43494 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43494/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43494 RELEASE DATE: 2011-03-18 DISCUSS ADVISORY: http://secunia.com/advisories/43494/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/43494/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=43494 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in SEIL Routers, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is reported in the following products: * SEIL/x86 firmware 1.00 to 1.61. * SEIL/B1 firmware 1.00 to 3.11. * SEIL/X1 firmware 1.00 to 3.11. * SEIL/X2 firmware 1.00 to 3.11. * SEIL/Turbo firmware 1.80 to 2.10. SOLUTION: Update to a patched version. Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.seil.jp/support/security/a01001.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2011-0454 // JVNDB: JVNDB-2011-000014 // CNVD: CNVD-2011-0817 // BID: 46598 // VULHUB: VHN-48399 // PACKETSTORM: 99440

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2011-0817

AFFECTED PRODUCTS

vendor:iijmodel:seil\/x2scope:eqversion:3.11

Trust: 1.6

vendor:iijmodel:seil\/turboscope:eqversion:1.82

Trust: 1.6

vendor:iijmodel:seil\/x86scope:eqversion:1.00

Trust: 1.6

vendor:iijmodel:seil\/x86scope:eqversion:1.61

Trust: 1.6

vendor:iijmodel:seil\/turboscope:eqversion:2.04

Trust: 1.6

vendor:iijmodel:seil\/x2scope:eqversion:3.01

Trust: 1.6

vendor:iijmodel:seil\/turboscope:eqversion:1.81

Trust: 1.6

vendor:iijmodel:seil\/x2scope:eqversion:3.10

Trust: 1.6

vendor:iijmodel:seil\/turboscope:eqversion:1.84

Trust: 1.6

vendor:iijmodel:seil\/turboscope:eqversion:1.80

Trust: 1.6

vendor:iijmodel:seil\/x1scope:eqversion:2.40

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:2.01

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.20

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.30

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.61

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.40

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.62

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.41

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.32

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.92

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.30

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:*

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.50

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:1.83

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.11

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:2.00

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.43

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.93

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.44

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:2.08

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.21

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.75

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.99

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:2.02

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:2.05

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.74

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:3.02

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.74

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:3.02

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.10

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:2.06

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:2.07

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.51

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.61

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.91

Trust: 1.0

vendor:iijmodel:seil\/x86scope:eqversion:*

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.62

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.61

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.32

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.62

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.63

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:2.01

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.72

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.30

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:*

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.50

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.41

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:1.94

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:2.09

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.43

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.44

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.83

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:2.00

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:2.08

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:1.95

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.73

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:1.96

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.00

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.22

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:1.85

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:1.90

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:2.02

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.84

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.51

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:2.06

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.63

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.81

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.63

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.41

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:*

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.20

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.10

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.10

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:2.10

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:1.98

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.94

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.31

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:2.03

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:2.09

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.20

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:3.11

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.50

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.41

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.73

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.60

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:3.10

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.00

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.22

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.95

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.70

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:1.00

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.96

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:*

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.42

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.90

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.85

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.75

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.40

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:*

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.20

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.52

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.10

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.51

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:3.01

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.31

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.20

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:3.01

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.98

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:2.10

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.41

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.60

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.80

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:2.04

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:2.03

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.60

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.72

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.70

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.30

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.70

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.40

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.42

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:1.92

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:3.11

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.42

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.73

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:3.10

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:1.93

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.75

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:1.40

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.52

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.52

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.11

Trust: 1.0

vendor:iijmodel:seil\/neu 2fe plusscope:eqversion:1.82

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:1.99

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:1.21

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:2.05

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:2.07

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.72

Trust: 1.0

vendor:iijmodel:seil\/turboscope:eqversion:1.91

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.74

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:3.02

Trust: 1.0

vendor:iijmodel:seil\/x1scope:eqversion:2.30

Trust: 1.0

vendor:iijmodel:seil\/b1scope:eqversion:2.01

Trust: 1.0

vendor:iijmodel:seil\/x2scope:eqversion:2.10

Trust: 1.0

vendor:seilmodel:turboscope:eqversion:1.80

Trust: 0.9

vendor:seilmodel:turboscope:eqversion:2.10

Trust: 0.9

vendor:seilmodel:seil/x86scope:eqversion:1.00

Trust: 0.9

vendor:seilmodel:seil/x86scope:eqversion:1.61

Trust: 0.9

vendor:seilmodel:neu 2fe plusscope:eqversion:1.80

Trust: 0.9

vendor:seilmodel:neu 2fe plusscope:eqversion:2.10

Trust: 0.9

vendor:seilmodel:seil/x1scope:eqversion:1.00

Trust: 0.9

vendor:seilmodel:seil/x1scope:eqversion:3.11

Trust: 0.9

vendor:seilmodel:seil/x2scope:eqversion:3.11

Trust: 0.9

vendor:seilmodel:seil/b1scope:eqversion:1.00

Trust: 0.9

vendor:seilmodel:seil/b1scope:eqversion:3.11

Trust: 0.9

vendor:internet initiativemodel:seil/b1scope:eqversion:1.00 to 3.11

Trust: 0.8

vendor:internet initiativemodel:seil/neu 2fe plusscope:eqversion:1.80 to 2.10

Trust: 0.8

vendor:internet initiativemodel:seil/turboscope:eqversion:1.80 to 2.10

Trust: 0.8

vendor:internet initiativemodel:seil/x1scope:eqversion:1.00 to 3.11

Trust: 0.8

vendor:internet initiativemodel:seil/x2scope:eqversion:1.00 to 3.11

Trust: 0.8

vendor:internet initiativemodel:seil/x86scope:eqversion:1.00 to 1.61

Trust: 0.8

vendor:seilmodel:turboscope:neversion:2.11

Trust: 0.3

vendor:seilmodel:seil/x2scope:neversion:3.12

Trust: 0.3

vendor:seilmodel:seil/x1scope:neversion:3.12

Trust: 0.3

vendor:seilmodel:seil/b1scope:neversion:3.12

Trust: 0.3

vendor:seilmodel:neu 2fe plusscope:neversion:2.11

Trust: 0.3

sources: CNVD: CNVD-2011-0817 // BID: 46598 // JVNDB: JVNDB-2011-000014 // CNNVD: CNNVD-201103-009 // NVD: CVE-2011-0454

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-0454
value: HIGH

Trust: 1.0

IPA: JVNDB-2011-000014
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201103-009
value: HIGH

Trust: 0.6

VULHUB: VHN-48399
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-0454
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2011-000014
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-48399
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-48399 // JVNDB: JVNDB-2011-000014 // CNNVD: CNNVD-201103-009 // NVD: CVE-2011-0454

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-48399 // JVNDB: JVNDB-2011-000014 // NVD: CVE-2011-0454

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201103-009

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201103-009

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-000014

PATCH

title:a01001(Japanese)url:http://www.seil.jp/support/security/a01001.html

Trust: 0.8

title:Patch for SEIL Multiple Products PPP Access Concentrator (PPPAC) Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/3112

Trust: 0.6

sources: CNVD: CNVD-2011-0817 // JVNDB: JVNDB-2011-000014

EXTERNAL IDS

db:JVNid:JVN88991166

Trust: 3.4

db:NVDid:CVE-2011-0454

Trust: 3.4

db:SECUNIAid:43494

Trust: 2.6

db:JVNDBid:JVNDB-2011-000014

Trust: 2.5

db:BIDid:46598

Trust: 2.2

db:XFid:65672

Trust: 0.8

db:CNNVDid:CNNVD-201103-009

Trust: 0.7

db:CNVDid:CNVD-2011-0817

Trust: 0.6

db:JVNid:JVN#88991166

Trust: 0.6

db:VULHUBid:VHN-48399

Trust: 0.1

db:PACKETSTORMid:99440

Trust: 0.1

sources: CNVD: CNVD-2011-0817 // VULHUB: VHN-48399 // BID: 46598 // JVNDB: JVNDB-2011-000014 // PACKETSTORM: 99440 // CNNVD: CNNVD-201103-009 // NVD: CVE-2011-0454

REFERENCES

url:http://secunia.com/advisories/43494

Trust: 2.5

url:http://www.securityfocus.com/bid/46598

Trust: 1.9

url:http://www.seil.jp/support/security/a01001.html

Trust: 1.8

url:http://jvn.jp/en/jp/jvn88991166/index.html

Trust: 1.7

url:http://jvndb.jvn.jp/jvndb/jvndb-2011-000014

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/65672

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0454

Trust: 0.8

url:http://www.ipa.go.jp/security/english/vuln/201102_seil_en.html

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/65672

Trust: 0.8

url:http://jvn.jp/en/jp/jvn88991166

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0454

Trust: 0.8

url:http://jvn.jp/jp/jvn88991166/index.htmlhttp

Trust: 0.6

url:http://jvn.jp/jp/jvn88991166/index.html

Trust: 0.3

url:http://www.seil.jp/

Trust: 0.3

url:http://www.seil.jp/download/firmware/

Trust: 0.3

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/company/events/mms_2011/

Trust: 0.1

url:http://secunia.com/advisories/43494/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43494

Trust: 0.1

url:http://secunia.com/advisories/43494/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2011-0817 // VULHUB: VHN-48399 // BID: 46598 // JVNDB: JVNDB-2011-000014 // PACKETSTORM: 99440 // CNNVD: CNNVD-201103-009 // NVD: CVE-2011-0454

CREDITS

The vendor

Trust: 0.3

sources: BID: 46598

SOURCES

db:CNVDid:CNVD-2011-0817
db:VULHUBid:VHN-48399
db:BIDid:46598
db:JVNDBid:JVNDB-2011-000014
db:PACKETSTORMid:99440
db:CNNVDid:CNNVD-201103-009
db:NVDid:CVE-2011-0454

LAST UPDATE DATE

2025-04-11T23:07:34.698000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-0817date:2011-03-01T00:00:00
db:VULHUBid:VHN-48399date:2017-08-17T00:00:00
db:BIDid:46598date:2011-02-28T00:00:00
db:JVNDBid:JVNDB-2011-000014date:2011-02-28T00:00:00
db:CNNVDid:CNNVD-201103-009date:2011-03-02T00:00:00
db:NVDid:CVE-2011-0454date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2011-0817date:2011-03-01T00:00:00
db:VULHUBid:VHN-48399date:2011-03-01T00:00:00
db:BIDid:46598date:2011-02-28T00:00:00
db:JVNDBid:JVNDB-2011-000014date:2011-02-28T00:00:00
db:PACKETSTORMid:99440date:2011-03-18T07:48:13
db:CNNVDid:CNNVD-201103-009date:2011-03-02T00:00:00
db:NVDid:CVE-2011-0454date:2011-03-01T23:00:02.800