ID

VAR-201111-0180


CVE

CVE-2011-4501


TITLE

Portable SDK for UPnP Devices (libupnp) contains multiple buffer overflows in SSDP

Trust: 0.8

sources: CERT/CC: VU#922681

DESCRIPTION

The UPnP IGD implementation in Edimax EdiLinux on the Edimax BR-6104K with firmware before 3.25, Edimax 6114Wg, Canyon-Tech CN-WF512 with firmware 1.83, Canyon-Tech CN-WF514 with firmware 2.08, Sitecom WL-153 with firmware before 1.39, and Sweex LB000021 with firmware 3.15 allows remote attackers to establish arbitrary port mappings by sending a UPnP AddPortMapping action in a SOAP request to the WAN interface, related to an "external forwarding" vulnerability. The Portable SDK for UPnP Devices libupnp library contains multiple buffer overflow vulnerabilities. Devices that use libupnp may also accept UPnP queries over the WAN interface, therefore exposing the vulnerabilities to the internet. Universal Plug and Play (UPnP) Multiple compatible routers have vulnerabilities with insufficient access restrictions. UPnP For supported routers, WAN Unintended from the side interface UPnP There is a vulnerability that allows the request to be accepted.An unauthenticated remote third party could obtain local network information or use the product as a proxy. Universal Plug and Play (UPnP) is a network protocol that is mostly used for personal computer device discovery and communication with other devices and the Internet. These requests can be used to connect to the internal host or proxy connection of the NAT firewall. Remote unauthenticated attackers can exploit vulnerabilities to scan internal hosts or communicate via the device proxy Internet. The following devices are affected: Cisco Linksys WRT54G firmware version prior to 4.30.5 Cisco Linksys WRT54GS v1 through v3 firmware versions prior to 4.71.1 Cisco Linksys WRT54GS v4 firmware versions prior to 1.06.1 Cisco Linksys WRT54GX firmware 2.00.05 Edimax BR-6104K prior to 3.25 Edimax 6114Wg Canyon-Tech CN-WF512 firmware version 1.83 Canyon-Tech CN-WF514 firmware version 2.08 Sitecom WL-153 prior to firmware 1.39 Sitecom WL-111 Sweex LB000021 firmware version 3.15 ZyXEL P-330W SpeedTouch 5x6 firmware versions prior to 6.2.29 Thomson TG585 firmware versions prior to 7.4.3.2. Vulnerabilities exist in the UPnP IGD installation and enablement of Edimax EdiLinux for various versions of Edimax. This vulnerability is related to the \"external forwarding\" vulnerability. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Siemens OZW / OZS Multiple Products libupnp Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA52035 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/52035/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=52035 RELEASE DATE: 2013-01-31 DISCUSS ADVISORY: http://secunia.com/advisories/52035/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/52035/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=52035 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in multiple Siemens OZW and OZS products, which can be exploited by malicious people to compromise a vulnerable device. 1) Multiple vulnerabilities are caused due to a bundled version of libupnp. For more information: SA51949 2) Multiple boundary errors within the "unique_service_name()" function (ssdp/ssdp_ctrlpt.c) in libupnp when handling SSDP requests can be exploited to cause stack-based buffer overflows. The vendor is planning to provide fixes with upcoming firmware updates. PROVIDED AND/OR DISCOVERED BY: 2) Rapid7 ORIGINAL ADVISORY: Siemens SSA-963338: http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-963338.pdf Rapid7: https://community.rapid7.com/docs/DOC-2150 https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . This library is used in several vendor network devices in addition to media streaming and file sharing applications. These vulnerabilities were disclosed on January 29th, 2013 in a CERT Vulnerability Note, VU#922681, which can be viewed at: http://www.kb.cert.org/vuls/id/922681 Cisco is currently evaluating products for possible exposure to these vulnerabilities. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iF4EAREIAAYFAlEIJZ8ACgkQUddfH3/BbTrUagD9FnKSVkc2iIfGs+7c8SVPT26+ ga5hYEz9UMUnitcqnbcBAIKe6KnkR6he2zbstVtbTKtqSjE7pfVb3lTKVZSeAkM5 =6sTu -----END PGP SIGNATURE-----

Trust: 4.86

sources: NVD: CVE-2011-4501 // CERT/CC: VU#922681 // CERT/CC: VU#357851 // JVNDB: JVNDB-2011-002341 // JVNDB: JVNDB-2011-003031 // CNVD: CNVD-2011-5058 // BID: 50810 // VULHUB: VHN-52446 // PACKETSTORM: 119949 // PACKETSTORM: 119896

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2011-5058

AFFECTED PRODUCTS

vendor:sweexmodel:lb000021 routerscope:eqversion:3.15

Trust: 2.4

vendor:canyon techmodel:cn-wf512 routerscope:eqversion:1.83

Trust: 1.0

vendor:sitecommodel:wl-153 routerscope:eqversion:1.31

Trust: 1.0

vendor:sweexmodel:lb000021scope:eqversion: -

Trust: 1.0

vendor:edimaxmodel:br-6104kscope:eqversion: -

Trust: 1.0

vendor:canyon techmodel:cn-wf514 routerscope:eqversion:2.08

Trust: 1.0

vendor:edimaxmodel:6114wg routerscope:eqversion:1.83

Trust: 1.0

vendor:canyon techmodel:cn-wf514scope:eqversion: -

Trust: 1.0

vendor:sitecommodel:wl-153 routerscope:eqversion:1.34

Trust: 1.0

vendor:edimaxmodel:6114wg routerscope:eqversion:2.08

Trust: 1.0

vendor:edimaxmodel:br-6104k routerscope:eqversion:3.21

Trust: 1.0

vendor:edimaxmodel:6114wgscope:eqversion: -

Trust: 1.0

vendor:canyon techmodel:cn-wf512scope:eqversion: -

Trust: 1.0

vendor:sitecommodel:wl-153scope:eqversion: -

Trust: 1.0

vendor:edimaxmodel:br-6104kscope:eqversion:0

Trust: 0.9

vendor:edimaxmodel:6114wgscope:eqversion:0

Trust: 0.9

vendor:canyon techmodel:cn-wf514scope:eqversion:2.08

Trust: 0.9

vendor:canyon techmodel:cn-wf512scope:eqversion:1.83

Trust: 0.9

vendor:zyxelmodel:p-330wscope:eqversion:0

Trust: 0.9

vendor:thomsonmodel:tg585 routerscope:eqversion:0

Trust: 0.9

vendor:speedtouchmodel: - scope:eqversion:5x60

Trust: 0.9

vendor:sitcommodel:wl-153scope:eqversion:0

Trust: 0.9

vendor:sitcommodel:wl-111scope:eqversion:0

Trust: 0.9

vendor:axismodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:d linkmodel: - scope: - version: -

Trust: 0.8

vendor:fujitsumodel: - scope: - version: -

Trust: 0.8

vendor:huaweimodel: - scope: - version: -

Trust: 0.8

vendor:linksysmodel: - scope: - version: -

Trust: 0.8

vendor:necmodel: - scope: - version: -

Trust: 0.8

vendor:siemensmodel: - scope: - version: -

Trust: 0.8

vendor:sonymodel: - scope: - version: -

Trust: 0.8

vendor:synologymodel: - scope: - version: -

Trust: 0.8

vendor:ipitomymodel: - scope: - version: -

Trust: 0.8

vendor:canyon techmodel: - scope: - version: -

Trust: 0.8

vendor:edimax computermodel: - scope: - version: -

Trust: 0.8

vendor:linksys a division of ciscomodel: - scope: - version: -

Trust: 0.8

vendor:sitecommodel: - scope: - version: -

Trust: 0.8

vendor:sweexmodel: - scope: - version: -

Trust: 0.8

vendor:technicolormodel: - scope: - version: -

Trust: 0.8

vendor:zyxelmodel: - scope: - version: -

Trust: 0.8

vendor:multiple vendorsmodel: - scope: - version: -

Trust: 0.8

vendor:canyonmodel:cn-wf512scope: - version: -

Trust: 0.8

vendor:canyonmodel:cn-wf512 routerscope:eqversion:1.83

Trust: 0.8

vendor:canyonmodel:cn-wf514scope: - version: -

Trust: 0.8

vendor:canyonmodel:cn-wf514 routerscope:eqversion:2.08

Trust: 0.8

vendor:edimaxmodel:br-6104kscope: - version: -

Trust: 0.8

vendor:edimaxmodel:br-6104k routerscope:ltversion:3.25

Trust: 0.8

vendor:edimaxmodel:br-6114wgscope: - version: -

Trust: 0.8

vendor:edimaxmodel:br-6114wg routerscope: - version: -

Trust: 0.8

vendor:sitecommodel:wl-153scope: - version: -

Trust: 0.8

vendor:sitecommodel:wl-153 routerscope:ltversion:1.39

Trust: 0.8

vendor:sweexmodel:lb000021scope: - version: -

Trust: 0.8

vendor:linksysmodel:wrt54g beta/2.0scope:eqversion:4.04.20.6/4.04.0.7/3.03.3.6/3.03.1.3/2.02.4.4/2.02.02.82.00.8

Trust: 0.6

vendor:linksysmodel:wrt54gscope:eqversion:v4.04.20.6

Trust: 0.3

vendor:linksysmodel:wrt54gscope:eqversion:v4.04.0.7

Trust: 0.3

vendor:linksysmodel:wrt54gscope:eqversion:v3.03.3.6

Trust: 0.3

vendor:linksysmodel:wrt54gscope:eqversion:v3.03.1.3

Trust: 0.3

vendor:linksysmodel:wrt54gscope:eqversion:v2.02.4.4

Trust: 0.3

vendor:linksysmodel:wrt54g betascope:eqversion:v2.02.02.8

Trust: 0.3

vendor:linksysmodel:wrt54gscope:eqversion:v2.02.00.8

Trust: 0.3

vendor:thomsonmodel:tg585 routerscope:neversion:7.4.3.2

Trust: 0.3

vendor:speedtouchmodel: - scope:neversion:5x66.2.29

Trust: 0.3

vendor:sitcommodel:wl-153scope:neversion:1.39

Trust: 0.3

vendor:linksysmodel:wrt54gscope:neversion:v4.01.0.6

Trust: 0.3

vendor:edimaxmodel:br-6104kscope:neversion:3.25

Trust: 0.3

sources: CERT/CC: VU#922681 // CERT/CC: VU#357851 // CNVD: CNVD-2011-5058 // BID: 50810 // JVNDB: JVNDB-2011-002341 // JVNDB: JVNDB-2011-003031 // CNNVD: CNNVD-201111-363 // NVD: CVE-2011-4501

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-4501
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#357851
value: HIGH

Trust: 0.8

NVD: CVE-2011-4501
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201111-363
value: CRITICAL

Trust: 0.6

VULHUB: VHN-52446
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-4501
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CARNEGIE MELLON: VU#357851
severity: HIGH
baseScore: 9.4
vectorString: NONE
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

NVD: CVE-2011-4501
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-52446
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#357851 // VULHUB: VHN-52446 // JVNDB: JVNDB-2011-003031 // CNNVD: CNNVD-201111-363 // NVD: CVE-2011-4501

PROBLEMTYPE DATA

problemtype:CWE-16

Trust: 1.9

sources: VULHUB: VHN-52446 // JVNDB: JVNDB-2011-003031 // NVD: CVE-2011-4501

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201111-363

TYPE

configuration error

Trust: 0.6

sources: CNNVD: CNNVD-201111-363

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002341

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#357851

PATCH

title:Top Pageurl:http://www.canyon-tech.com/

Trust: 0.8

title:BR-6104Kurl:http://www.edimax.com/en/produce_detail.php?pd_id=58&pl1_id=3&pl2_id=18

Trust: 0.8

title:BR-6114Wgurl:http://www.edimax.co.uk/en/produce_detail.php?pd_id=146&pl1_id=1&pl2_id=48

Trust: 0.8

title:Top Pageurl:http://www.sitecom.com/

Trust: 0.8

title:LB000021url:http://www.sweex.com/en/assortiment/internet-networking/routers/LB000021/

Trust: 0.8

title:Patch for Multiple Routers UPnP WAN Interface Remote Unauthorized Access Vulnerability (CNVD-2011-5058)url:https://www.cnvd.org.cn/patchInfo/show/6019

Trust: 0.6

sources: CNVD: CNVD-2011-5058 // JVNDB: JVNDB-2011-003031

EXTERNAL IDS

db:CERT/CCid:VU#357851

Trust: 5.8

db:NVDid:CVE-2011-4501

Trust: 3.4

db:SIEMENSid:SSA-963338

Trust: 0.9

db:CERT/CCid:VU#922681

Trust: 0.9

db:JVNDBid:JVNDB-2011-002341

Trust: 0.8

db:JVNDBid:JVNDB-2011-003031

Trust: 0.8

db:CNNVDid:CNNVD-201111-363

Trust: 0.7

db:CNVDid:CNVD-2011-5058

Trust: 0.6

db:NSFOCUSid:18224

Trust: 0.6

db:BIDid:50810

Trust: 0.3

db:SECUNIAid:52035

Trust: 0.2

db:VULHUBid:VHN-52446

Trust: 0.1

db:PACKETSTORMid:119949

Trust: 0.1

db:PACKETSTORMid:119896

Trust: 0.1

sources: CERT/CC: VU#922681 // CERT/CC: VU#357851 // CNVD: CNVD-2011-5058 // VULHUB: VHN-52446 // BID: 50810 // JVNDB: JVNDB-2011-002341 // JVNDB: JVNDB-2011-003031 // PACKETSTORM: 119949 // PACKETSTORM: 119896 // CNNVD: CNNVD-201111-363 // NVD: CVE-2011-4501

REFERENCES

url:http://www.kb.cert.org/vuls/id/357851

Trust: 4.4

url:http://www.upnp-hacks.org/devices.html

Trust: 2.8

url:http://www.upnp-hacks.org/suspect.html

Trust: 1.7

url:http://homekb.cisco.com/cisco2/ukp.aspx?vw=1&articleid=28341

Trust: 1.6

url:http://jvn.jp/cert/jvnvu357851

Trust: 1.6

url:https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play

Trust: 0.9

url:https://community.rapid7.com/docs/doc-2150

Trust: 0.9

url:http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-963338.pdf

Trust: 0.9

url:http://pupnp.sourceforge.net/

Trust: 0.8

url:https://community.rapid7.com/servlet/jiveservlet/download/2150-1-16596/securityflawsupnp.pdf

Trust: 0.8

url:http://www.rapid7.com/resources/free-security-software-downloads/universal-plug-and-play-jan-2013.jsp

Trust: 0.8

url:http://opentools.homeip.net/dev-tools-for-upnp

Trust: 0.8

url:http://upnp.sourceforge.net/

Trust: 0.8

url:http://www.dlink.com/us/en/technology/upnp

Trust: 0.8

url:http://jpn.nec.com/security-info/secinfo/nv13-003.html

Trust: 0.8

url:http://www.ipitomy.com/index.php/mi-security-notice-ip001

Trust: 0.8

url:http://toor.do/upnp.html

Trust: 0.8

url:http://www.h-online.com/security/news/item/upnp-enabled-routers-allow-attacks-on-lans-1329727.html

Trust: 0.8

url:http://toor.do/defcon-19-garcia-upnp-mapping-wp.pdf

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4501

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4501

Trust: 0.8

url:http://www.kb.cert.org/vuls/id/357851http

Trust: 0.6

url:http://www.nsfocus.net/vulndb/18224

Trust: 0.6

url:http://secunia.com/advisories/52035/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=52035

Trust: 0.1

url:http://secunia.com/advisories/52035/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130129-upnp

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/922681

Trust: 0.1

sources: CERT/CC: VU#922681 // CERT/CC: VU#357851 // CNVD: CNVD-2011-5058 // VULHUB: VHN-52446 // BID: 50810 // JVNDB: JVNDB-2011-002341 // JVNDB: JVNDB-2011-003031 // PACKETSTORM: 119949 // PACKETSTORM: 119896 // CNNVD: CNNVD-201111-363 // NVD: CVE-2011-4501

CREDITS

Daniel Garcia

Trust: 0.3

sources: BID: 50810

SOURCES

db:CERT/CCid:VU#922681
db:CERT/CCid:VU#357851
db:CNVDid:CNVD-2011-5058
db:VULHUBid:VHN-52446
db:BIDid:50810
db:JVNDBid:JVNDB-2011-002341
db:JVNDBid:JVNDB-2011-003031
db:PACKETSTORMid:119949
db:PACKETSTORMid:119896
db:CNNVDid:CNNVD-201111-363
db:NVDid:CVE-2011-4501

LAST UPDATE DATE

2025-04-11T22:52:24.032000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#922681date:2014-07-30T00:00:00
db:CERT/CCid:VU#357851date:2012-11-30T00:00:00
db:CNVDid:CNVD-2011-5058date:2011-11-25T00:00:00
db:VULHUBid:VHN-52446date:2013-01-24T00:00:00
db:BIDid:50810date:2015-03-19T08:33:00
db:JVNDBid:JVNDB-2011-002341date:2011-10-12T00:00:00
db:JVNDBid:JVNDB-2011-003031date:2011-11-25T00:00:00
db:CNNVDid:CNNVD-201111-363date:2011-11-25T00:00:00
db:NVDid:CVE-2011-4501date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#922681date:2013-01-29T00:00:00
db:CERT/CCid:VU#357851date:2011-10-05T00:00:00
db:CNVDid:CNVD-2011-5058date:2011-11-25T00:00:00
db:VULHUBid:VHN-52446date:2011-11-22T00:00:00
db:BIDid:50810date:2011-11-24T00:00:00
db:JVNDBid:JVNDB-2011-002341date:2011-10-12T00:00:00
db:JVNDBid:JVNDB-2011-003031date:2011-11-25T00:00:00
db:PACKETSTORMid:119949date:2013-01-31T07:26:31
db:PACKETSTORMid:119896date:2013-01-30T02:46:44
db:CNNVDid:CNNVD-201111-363date:2011-11-25T00:00:00
db:NVDid:CVE-2011-4501date:2011-11-22T11:55:04.887