ID

VAR-201206-0410


CVE

CVE-2012-2632


TITLE

SEIL series fail to restrict access permissions

Trust: 0.8

sources: JVNDB: JVNDB-2012-000059

DESCRIPTION

SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session. SEIL series contain an issue where access permissions are not restricted. SEIL series are wireless LAN routers. SEIL series contain an issue where access permissions are not restricted.An attacker that can access the product's HTTP proxy may bypass restrictions such as the URL filter. The SEIL Router is a router from Japan's SEIL vendors. A security vulnerability exists in the SEIL Router that allows malicious users to bypass some security restrictions. There is an error in the HTTP-Proxy/Gateway function provided by the router. To successfully exploit the vulnerability, you need to set HTTP-Proxy and enable \"Application-Gateway\". SEIL routers are routers produced by SEIL manufacturers in Japan. A successful attack requires setting up an HTTP proxy and enabling an "Application Gateway". ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: SEIL Routers HTTP-Proxy/Gateway Functionality Security Bypass Vulnerability SECUNIA ADVISORY ID: SA49365 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49365/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49365 RELEASE DATE: 2012-06-06 DISCUSS ADVISORY: http://secunia.com/advisories/49365/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49365/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49365 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in SEIL routers, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an error within the HTTP-Proxy/Gateway functionality and can be exploited to e.g. The vulnerability is reported in the following products and versions: * SEIL/x86 firmware versions 1.00 through 2.35. * SEIL/X1 firmware versions 2.30 through 3.75. * SEIL/X2 firmware versions 2.30 through 3.75. * SEIL/B1 firmware versions 2.30 through 3.75. SOLUTION: Update to a fixed version. Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: SEIL: http://www.seil.jp/support/security/a01232.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.7

sources: NVD: CVE-2012-2632 // JVNDB: JVNDB-2012-000059 // CNVD: CNVD-2012-3059 // BID: 78183 // VULHUB: VHN-55913 // VULMON: CVE-2012-2632 // PACKETSTORM: 113468

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-3059

AFFECTED PRODUCTS

vendor:seilmodel:b1scope:eqversion:3.75

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.71

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.70

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.60

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.51

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.50

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.41

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.40

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.31

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.30

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.21

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.20

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.13

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.12

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.11

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.10

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.02

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:3.01

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.75

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.74

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.73

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.72

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.70

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.63

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.62

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.61

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.60

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.52

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.51

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.50

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.42

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.41

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.40

Trust: 2.6

vendor:seilmodel:b1scope:eqversion:2.30

Trust: 2.6

vendor:seilmodel:x2scope:eqversion:3.70

Trust: 1.6

vendor:seilmodel:x2scope:eqversion:3.51

Trust: 1.6

vendor:seilmodel:x1scope:eqversion:3.31

Trust: 1.6

vendor:seilmodel:x2scope:eqversion:3.50

Trust: 1.6

vendor:seilmodel:x2scope:eqversion:3.31

Trust: 1.6

vendor:seilmodel:x1scope:eqversion:3.40

Trust: 1.6

vendor:seilmodel:x2scope:eqversion:3.30

Trust: 1.6

vendor:seilmodel:x2scope:eqversion:3.40

Trust: 1.6

vendor:seilmodel:x2scope:eqversion:3.60

Trust: 1.6

vendor:seilmodel:x2scope:eqversion:3.41

Trust: 1.6

vendor:seilmodel:x2scope:eqversion:2.61

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:3.01

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.60

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.62

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.41

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.70

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.60

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.11

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.50

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.42

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.73

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.70

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.50

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.10

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.70

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.42

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.13

Trust: 1.0

vendor:seilmodel:x86scope:eqversion:1.00

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.52

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:3.13

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.75

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.12

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.52

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.20

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.30

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.51

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.63

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.71

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:3.20

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.21

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.63

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:3.71

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.30

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.40

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.72

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:3.21

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.41

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.30

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.50

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.40

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:3.11

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.73

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:3.10

Trust: 1.0

vendor:seilmodel:x86scope:eqversion:1.61

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.75

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:3.12

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.51

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.41

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.75

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.74

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.02

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.51

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:3.75

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.61

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.01

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:2.74

Trust: 1.0

vendor:seilmodel:x2scope:eqversion:3.02

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:3.60

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.62

Trust: 1.0

vendor:seilmodel:x1scope:eqversion:2.72

Trust: 1.0

vendor:internet initiativemodel:seil/b1scope:eqversion:2.30 to 3.75

Trust: 0.8

vendor:internet initiativemodel:seil/x1scope:eqversion:2.30 to 3.75

Trust: 0.8

vendor:internet initiativemodel:seil/x2scope:eqversion:2.30 to 3.75

Trust: 0.8

vendor:internet initiativemodel:seil/x86scope:eqversion:1.00 to 2.35

Trust: 0.8

vendor:seilmodel:seil/x86scope:eqversion:1.00

Trust: 0.6

vendor:seilmodel:seil/x86scope:eqversion:2.35

Trust: 0.6

vendor:seilmodel:seil/x1scope:eqversion:2.30

Trust: 0.6

vendor:seilmodel:seil/x1scope:eqversion:3.75

Trust: 0.6

vendor:seilmodel:seil/x2scope:eqversion:2.30

Trust: 0.6

vendor:seilmodel:seil/x2scope:eqversion:3.75

Trust: 0.6

vendor:seilmodel:seil/b1scope:eqversion:2.30

Trust: 0.6

vendor:seilmodel:seil/b1scope:eqversion:3.75

Trust: 0.6

vendor:seilmodel: - scope:eqversion:x861.61

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x861.00

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.75

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.71

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.70

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.60

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.51

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.50

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.41

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.40

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.31

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.30

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.21

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.20

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.13

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.12

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.11

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.10

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.02

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x23.01

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.75

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.74

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.73

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.72

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.70

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.63

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.62

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.61

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.60

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.52

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.51

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.50

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.42

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.41

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.40

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x22.30

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.75

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.71

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.70

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.60

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.51

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.50

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.41

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.40

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.31

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.30

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.21

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.20

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.13

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.12

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.11

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.10

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.02

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x13.01

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.75

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.74

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.73

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.72

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.70

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.63

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.62

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.61

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.60

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.52

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.51

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.50

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.42

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.41

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.40

Trust: 0.3

vendor:seilmodel: - scope:eqversion:x12.30

Trust: 0.3

sources: CNVD: CNVD-2012-3059 // BID: 78183 // JVNDB: JVNDB-2012-000059 // CNNVD: CNNVD-201206-074 // NVD: CVE-2012-2632

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-2632
value: LOW

Trust: 1.0

IPA: JVNDB-2012-000059
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201206-074
value: LOW

Trust: 0.6

VULHUB: VHN-55913
value: LOW

Trust: 0.1

VULMON: CVE-2012-2632
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2012-2632
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

IPA: JVNDB-2012-000059
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-55913
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-55913 // VULMON: CVE-2012-2632 // JVNDB: JVNDB-2012-000059 // CNNVD: CNNVD-201206-074 // NVD: CVE-2012-2632

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-264

Trust: 0.8

sources: JVNDB: JVNDB-2012-000059 // NVD: CVE-2012-2632

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201206-074

TYPE

Access Validation Error

Trust: 0.3

sources: BID: 78183

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-000059

PATCH

title:Internet Initiative Japan Inc. websiteurl:http://www.seil.jp/support/security/a01232.html

Trust: 0.8

title:SEIL Routers HTTP-Proxy/Gateway feature security bypass vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/17812

Trust: 0.6

sources: CNVD: CNVD-2012-3059 // JVNDB: JVNDB-2012-000059

EXTERNAL IDS

db:NVDid:CVE-2012-2632

Trust: 3.5

db:JVNid:JVN24646833

Trust: 2.9

db:JVNDBid:JVNDB-2012-000059

Trust: 2.9

db:CNNVDid:CNNVD-201206-074

Trust: 0.7

db:SECUNIAid:49365

Trust: 0.7

db:CNVDid:CNVD-2012-3059

Trust: 0.6

db:NSFOCUSid:19754

Trust: 0.6

db:JVNid:JVN#24646833

Trust: 0.6

db:BIDid:78183

Trust: 0.5

db:VULHUBid:VHN-55913

Trust: 0.1

db:VULMONid:CVE-2012-2632

Trust: 0.1

db:PACKETSTORMid:113468

Trust: 0.1

sources: CNVD: CNVD-2012-3059 // VULHUB: VHN-55913 // VULMON: CVE-2012-2632 // BID: 78183 // JVNDB: JVNDB-2012-000059 // PACKETSTORM: 113468 // CNNVD: CNNVD-201206-074 // NVD: CVE-2012-2632

REFERENCES

url:http://jvn.jp/en/jp/jvn24646833/index.html

Trust: 2.9

url:http://www.seil.jp/support/security/a01232.html

Trust: 2.2

url:http://jvndb.jvn.jp/jvndb/jvndb-2012-000059

Trust: 2.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2632

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2632

Trust: 0.8

url:http://www.seil.jp/support/security/a01232.htmlhttp

Trust: 0.6

url:http://secunia.com/advisories/49365

Trust: 0.6

url:http://www.nsfocus.net/vulndb/19754

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.securityfocus.com/bid/78183

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/49365/#comments

Trust: 0.1

url:http://secunia.com/advisories/49365/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=49365

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-3059 // VULHUB: VHN-55913 // VULMON: CVE-2012-2632 // BID: 78183 // JVNDB: JVNDB-2012-000059 // PACKETSTORM: 113468 // CNNVD: CNNVD-201206-074 // NVD: CVE-2012-2632

CREDITS

Unknown

Trust: 0.3

sources: BID: 78183

SOURCES

db:CNVDid:CNVD-2012-3059
db:VULHUBid:VHN-55913
db:VULMONid:CVE-2012-2632
db:BIDid:78183
db:JVNDBid:JVNDB-2012-000059
db:PACKETSTORMid:113468
db:CNNVDid:CNNVD-201206-074
db:NVDid:CVE-2012-2632

LAST UPDATE DATE

2025-04-11T23:04:13.258000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-3059date:2012-06-08T00:00:00
db:VULHUBid:VHN-55913date:2012-06-18T00:00:00
db:VULMONid:CVE-2012-2632date:2012-06-18T00:00:00
db:BIDid:78183date:2012-06-15T00:00:00
db:JVNDBid:JVNDB-2012-000059date:2012-06-06T00:00:00
db:CNNVDid:CNNVD-201206-074date:2012-06-08T00:00:00
db:NVDid:CVE-2012-2632date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-3059date:2012-06-08T00:00:00
db:VULHUBid:VHN-55913date:2012-06-15T00:00:00
db:VULMONid:CVE-2012-2632date:2012-06-15T00:00:00
db:BIDid:78183date:2012-06-15T00:00:00
db:JVNDBid:JVNDB-2012-000059date:2012-06-06T00:00:00
db:PACKETSTORMid:113468date:2012-06-11T01:01:35
db:CNNVDid:CNNVD-201206-074date:2012-06-08T00:00:00
db:NVDid:CVE-2012-2632date:2012-06-15T19:55:01.530