ID

VAR-201204-0171


CVE

CVE-2012-0133


TITLE

HP ProCurve 5400 zl Switch Malware infected flash card vulnerability

Trust: 0.8

sources: IVD: f34b8a14-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1862

DESCRIPTION

HP ProCurve 5400 zl switches with certain serial numbers include a compact flash card that contains an unspecified virus, which might allow user-assisted remote attackers to execute arbitrary code on a PC by leveraging manual transfer of this card. The HP ProCurve 5400 zl Switch is a network switch developed by Hewlett-Packard. Some flash cards distributed by the switch have malware, which can infect the user's system if the user connects to the flash card. Attackers can exploit this issue to infect a users's system. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: HP ProCurve 5400 zl Switch Malware Infected Compact Flash Card SECUNIA ADVISORY ID: SA48738 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48738/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48738 RELEASE DATE: 2012-04-11 DISCUSS ADVISORY: http://secunia.com/advisories/48738/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48738/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48738 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A security issue has been reported in the HP ProCurve 5400 zl Switch, which can be exploited by malicious people to compromise a users's system. Please see the vendor's advisory for a list of affected models and serial numbers. SOLUTION: Apply the vendor workaround (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03249176 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03249176 Version: 2 HPSBPV02754 SSRT100803 rev.2 - HP ProCurve 5400 zl Switch, Compact flash card contains trojan malware NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2012-04-26 Last Updated: 2012-04-26 Potential Security Impact: Local compromise of system integrity Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with certain HP ProCurve 5400 zl switches using a compact flash card which may contain malware content that is a PC trojan executable. Reuse of the compact flash card in a personal computer and manual execution of the malware content could result in a compromise of that system's integrity. References: CVE-2012-0133 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. This script will delete the fi(s) and directory without exposing a personal computer to the files on the compact flash. The operation of the switch is not impacted. This option is best for customers wanting to maximize the uptime of their network. Hardware Replacement Option : For those customers who have 5400 zl switch inventory that is not on their network and must be purged, this option allows for the Management Module to be replaced. Also, any customer that feels uncomfortable performing the Software Purge Option can choose the Hardware Replacement Option as well. An advanced replacement Management Module will be sent to the customer. Once it arrives, the original Management Module is returned to HP after the new one is installed. The downside to this option is that the 5400 zl switch must be powered down in order to replace the Management Module, resulting in downtime. Software Update Option (recommended) : The following Early Availability software update K.15.08.00007 is available which will automatically delete the malware trojan contents on the compact flash card if present. The software update also contains many other features and functionality enhancements for the switch. Note that updating the switch software should always be done with care and with an analysis of any potential impacts. Please refer to the release notes provided with the software update location below. For Options 1 or 2, please contact HP support: For customers with an HP Passport account, a web case can be submitted here: https://h10145.www1.hp.com/help/help_questions.aspx?l2id=48&SelectedTab=3 To talk to HP support directly, worldwide telephone numbers are available here: https://h10145.www1.hp.com/help/Help_ContactInfo.aspx?cwp=2&SelectedTab=2 For Option 3, the Early Availability software update K.15.08.00007 is available here: https://h10145.www1.hp.com/downloads/SoftwareReleases.aspx?ProductNumber=J9533A The release notes for K.15.08.00007 is available here: http://bizsupport1.austin.hp.com/bc/docs/support/SupportManual/c03277372/c03277372.pdf HISTORY Version:1 (rev.1) - 10 April 2012 Initial Release Version:2 (rev.2) - 26 April 2012 Updated case details and solution choices Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430 Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk+ZqmwACgkQ4B86/C0qfVk3EQCdELKvAW0sFV2DNpCn1cajRwTJ 0GAAoJfBY3H5ZeO9qRZvSu5lD933i78M =40Tv -----END PGP SIGNATURE-----

Trust: 2.97

sources: NVD: CVE-2012-0133 // JVNDB: JVNDB-2012-002064 // CNVD: CNVD-2012-1862 // BID: 52990 // IVD: f34b8a14-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-53414 // PACKETSTORM: 111777 // PACKETSTORM: 111785 // PACKETSTORM: 112293

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: f34b8a14-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1862

AFFECTED PRODUCTS

vendor:hpmodel:procurve switch 5400zl management modulescope:eqversion:id117as00h

Trust: 1.6

vendor:hpmodel:procurve switch chassis e5406zlscope:eqversion: -

Trust: 1.6

vendor:hpmodel:procurve switch chassis e5412zlscope:eqversion: -

Trust: 1.6

vendor:hpmodel:procurve switch 5412-92g-poe\+-4sfpzlscope:eqversion: -

Trust: 1.6

vendor:hpmodel:procurve switch 5400zl management modulescope:eqversion:id116as0hr

Trust: 1.6

vendor:hpmodel:procurve switch 5400zl management modulescope:eqversion:id116as04p

Trust: 1.6

vendor:hpmodel:procurve switch 5412-96gzlscope:eqversion: -

Trust: 1.6

vendor:hpmodel:procurve switch 5406-48gzlscope:eqversion: -

Trust: 1.6

vendor:hpmodel:procurve switch 5406-44g-poe\+-4sfpzlscope:eqversion: -

Trust: 1.6

vendor:hpmodel:procurve switch 5400zl management modulescope:eqversion:id126as0fb

Trust: 1.6

vendor:hpmodel:procurve switch 5406zl-44g-poe\+\/2xg sfp\+ v2scope:eqversion: -

Trust: 1.0

vendor:hpmodel:procurve switch 5400zlscope:eqversion:*

Trust: 1.0

vendor:hpmodel:procurve switch e5412zlscope:eqversion: -

Trust: 1.0

vendor:hpmodel:procurve switch 5412zl-92g-poe\+\/4g sfp\+ v2scope:eqversion: -

Trust: 1.0

vendor:hpmodel:procurve switch 5412zl-92gg-poe\+\/2xg sfp\+ v2scope:eqversion: -

Trust: 1.0

vendor:hpmodel:procurve switch e5406zlscope:eqversion: -

Trust: 1.0

vendor:hpmodel:procurve switch 5406zl-44g-poe\+\/4g sfp\+ v2scope:eqversion: -

Trust: 1.0

vendor:hewlett packardmodel:hp 5400 zl switch seriesscope: - version: -

Trust: 0.8

vendor:hpmodel:procurve zl switch seriesscope:eqversion:5400

Trust: 0.6

vendor:hpmodel:management module series zl switch j8726ascope:eqversion:5400

Trust: 0.3

vendor:hpmodel:e5412 zl switch with premium software j9643ascope: - version: -

Trust: 0.3

vendor:hpmodel:e5412 zl switch chassis j8698ascope: - version: -

Trust: 0.3

vendor:hpmodel:e5406 zl switch with premium software j9642ascope: - version: -

Trust: 0.3

vendor:hpmodel:e5406 zl switch chassis j8697ascope: - version: -

Trust: 0.3

vendor:hpmodel:5412zl-92gg-poe+ 2xg sfp+ switch j9532ascope:eqversion:/v2

Trust: 0.3

vendor:hpmodel:5412zl-92g-poe+ 4g sfp switch j9540ascope:eqversion:/v2

Trust: 0.3

vendor:hpmodel:5412-96g zl switch j8700ascope: - version: -

Trust: 0.3

vendor:hpmodel:5412-92g-poe+-4sfp zl switch j9448ascope: - version: -

Trust: 0.3

vendor:hpmodel:5406zl-44g-poe+ 4g sfp switch j9539ascope:eqversion:/v2

Trust: 0.3

vendor:hpmodel:5406zl-44g-poe+ 2xg sfp+ switch j9533ascope:eqversion:/v2

Trust: 0.3

vendor:hpmodel:5406-48g zl switch j8699ascope: - version: -

Trust: 0.3

vendor:hpmodel:5406-44g-poe+-4sfp zl switch j9447ascope: - version: -

Trust: 0.3

vendor:procurve switch 5400zlmodel: - scope:eqversion:*

Trust: 0.2

vendor:procurve switch 5400zl management modulemodel:id116as0hrscope: - version: -

Trust: 0.2

vendor:procurve switch 5400zl management modulemodel:id116as04pscope: - version: -

Trust: 0.2

vendor:procurve switch 5400zl management modulemodel:id117as00hscope: - version: -

Trust: 0.2

vendor:procurve switch 5400zl management modulemodel:id126as0fbscope: - version: -

Trust: 0.2

vendor:procurve switch 5406 44g poe 4sfpzlmodel: - scope:eqversion: -

Trust: 0.2

vendor:procurve switch 5406 48gzlmodel: - scope:eqversion: -

Trust: 0.2

vendor:procurve switch 5406zl 44g poe 2xg sfp v2model: - scope:eqversion: -

Trust: 0.2

vendor:procurve switch 5406zl 44g poe 4g sfp v2model: - scope:eqversion: -

Trust: 0.2

vendor:procurve switch 5412 92g poe 4sfpzlmodel: - scope:eqversion: -

Trust: 0.2

vendor:procurve switch 5412 96gzlmodel: - scope:eqversion: -

Trust: 0.2

vendor:procurve switch 5412zl 92g poe 4g sfp v2model: - scope:eqversion: -

Trust: 0.2

vendor:procurve switch 5412zl 92gg poe 2xg sfp v2model: - scope:eqversion: -

Trust: 0.2

vendor:procurve switch chassis e5406zlmodel: - scope:eqversion: -

Trust: 0.2

vendor:procurve switch chassis e5412zlmodel: - scope:eqversion: -

Trust: 0.2

vendor:procurve switch e5406zlmodel: - scope:eqversion: -

Trust: 0.2

vendor:procurve switch e5412zlmodel: - scope:eqversion: -

Trust: 0.2

sources: IVD: f34b8a14-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1862 // BID: 52990 // JVNDB: JVNDB-2012-002064 // CNNVD: CNNVD-201204-209 // NVD: CVE-2012-0133

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0133
value: LOW

Trust: 1.0

NVD: CVE-2012-0133
value: LOW

Trust: 0.8

CNNVD: CNNVD-201204-209
value: LOW

Trust: 0.6

IVD: f34b8a14-2353-11e6-abef-000c29c66e3d
value: LOW

Trust: 0.2

VULHUB: VHN-53414
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2012-0133
severity: LOW
baseScore: 3.7
vectorString: AV:L/AC:H/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 1.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: f34b8a14-2353-11e6-abef-000c29c66e3d
severity: LOW
baseScore: 3.7
vectorString: AV:L/AC:H/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 1.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-53414
severity: LOW
baseScore: 3.7
vectorString: AV:L/AC:H/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 1.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: f34b8a14-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-53414 // JVNDB: JVNDB-2012-002064 // CNNVD: CNNVD-201204-209 // NVD: CVE-2012-0133

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2012-002064 // NVD: CVE-2012-0133

THREAT TYPE

local

Trust: 0.9

sources: BID: 52990 // CNNVD: CNNVD-201204-209

TYPE

Design error

Trust: 0.8

sources: IVD: f34b8a14-2353-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201204-209

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002064

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-53414

PATCH

title:HPSBPV02754 SSRT100803url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03249176

Trust: 0.8

title:Patch for HP ProCurve 5400 zl Switch malware infected flash card vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/15733

Trust: 0.6

sources: CNVD: CNVD-2012-1862 // JVNDB: JVNDB-2012-002064

EXTERNAL IDS

db:NVDid:CVE-2012-0133

Trust: 3.8

db:SECUNIAid:48738

Trust: 2.4

db:SECTRACKid:1026916

Trust: 1.1

db:CNNVDid:CNNVD-201204-209

Trust: 0.9

db:CNVDid:CNVD-2012-1862

Trust: 0.8

db:JVNDBid:JVNDB-2012-002064

Trust: 0.8

db:HPid:HPSBPV02754

Trust: 0.6

db:HPid:SSRT100803

Trust: 0.6

db:NSFOCUSid:19505

Trust: 0.6

db:BIDid:52990

Trust: 0.4

db:IVDid:F34B8A14-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:111785

Trust: 0.2

db:PACKETSTORMid:112293

Trust: 0.2

db:VULHUBid:VHN-53414

Trust: 0.1

db:PACKETSTORMid:111777

Trust: 0.1

sources: IVD: f34b8a14-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1862 // VULHUB: VHN-53414 // BID: 52990 // JVNDB: JVNDB-2012-002064 // PACKETSTORM: 111777 // PACKETSTORM: 111785 // PACKETSTORM: 112293 // CNNVD: CNNVD-201204-209 // NVD: CVE-2012-0133

REFERENCES

url:http://www.securityfocus.com/archive/1/522288

Trust: 2.3

url:http://secunia.com/advisories/48738

Trust: 1.7

url:http://www.securitytracker.com/id?1026916

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/74819

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0133

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0133

Trust: 0.8

url:http://secunia.com/advisories/48738/

Trust: 0.7

url:http://www.nsfocus.net/vulndb/19505

Trust: 0.6

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03249176

Trust: 0.4

url:http://h17007.www1.hp.com/us/en/products/switches/hp_5400_zl_switch_series/index.aspx

Trust: 0.3

url:http://alerts.hp.com/r?2.1.3kt.2zr.xg7ek.hzfgyw..t.zjl4.6xk6.bw89mq%5f%5fdklqfsw0

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2012-0133

Trust: 0.2

url:http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.2

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.2

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c02964430

Trust: 0.2

url:https://h10145.www1.hp.com/help/help_contactinfo.aspx?cwp=2&selectedtab=2

Trust: 0.2

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48738

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/advisories/48738/#comments

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://bizsupport1.austin.hp.com/bc/docs/support/supportmanual/c03277372/c03277372.pdf

Trust: 0.1

url:https://h10145.www1.hp.com/downloads/softwarereleases.aspx?productnumber=j9533a

Trust: 0.1

url:https://h10145.www1.hp.com/help/help_questions.aspx?l2id=48&selectedtab=3

Trust: 0.1

sources: CNVD: CNVD-2012-1862 // VULHUB: VHN-53414 // BID: 52990 // JVNDB: JVNDB-2012-002064 // PACKETSTORM: 111777 // PACKETSTORM: 111785 // PACKETSTORM: 112293 // CNNVD: CNNVD-201204-209 // NVD: CVE-2012-0133

CREDITS

HP

Trust: 0.5

sources: BID: 52990 // PACKETSTORM: 111785 // PACKETSTORM: 112293

SOURCES

db:IVDid:f34b8a14-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-1862
db:VULHUBid:VHN-53414
db:BIDid:52990
db:JVNDBid:JVNDB-2012-002064
db:PACKETSTORMid:111777
db:PACKETSTORMid:111785
db:PACKETSTORMid:112293
db:CNNVDid:CNNVD-201204-209
db:NVDid:CVE-2012-0133

LAST UPDATE DATE

2025-04-11T23:04:14.259000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-1862date:2012-04-13T00:00:00
db:VULHUBid:VHN-53414date:2017-08-29T00:00:00
db:BIDid:52990date:2012-04-10T00:00:00
db:JVNDBid:JVNDB-2012-002064date:2012-04-13T00:00:00
db:CNNVDid:CNNVD-201204-209date:2012-04-13T00:00:00
db:NVDid:CVE-2012-0133date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:f34b8a14-2353-11e6-abef-000c29c66e3ddate:2012-04-13T00:00:00
db:CNVDid:CNVD-2012-1862date:2012-04-13T00:00:00
db:VULHUBid:VHN-53414date:2012-04-12T00:00:00
db:BIDid:52990date:2012-04-10T00:00:00
db:JVNDBid:JVNDB-2012-002064date:2012-04-13T00:00:00
db:PACKETSTORMid:111777date:2012-04-11T07:10:18
db:PACKETSTORMid:111785date:2012-04-12T03:19:35
db:PACKETSTORMid:112293date:2012-04-27T20:33:39
db:CNNVDid:CNNVD-201204-209date:2012-04-13T00:00:00
db:NVDid:CVE-2012-0133date:2012-04-12T10:45:14.080