ID

VAR-201310-0244


CVE

CVE-2013-3540


TITLE

plural AirLive Product cgi-bin/admin/usrgrp.cgi Vulnerable to cross-site request forgery

Trust: 0.8

sources: JVNDB: JVNDB-2013-004510

DESCRIPTION

Cross-site request forgery (CSRF) vulnerability in cgi-bin/admin/usrgrp.cgi in AirLive POE2600HD, POE250HD, POE200HD, OD-325HD, OD-2025HD, OD-2060HD, POE100HD, and possibly other camera models allows remote attackers to hijack the authentication of administrators for requests that add users. Airlive IP Camera is an IP camera device. Allows an attacker to build a malicious URI, entice the logged in user to resolve, and can log in to the user context to perform malicious operations. Such as adding an account. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks. =========================================================================== AIRLIVE ==================================================================== =========================================================================== 1.Advisory Information Title: Airlive Multiple Vulnerabilities Date Published: 12/06/2013 Date of last updated: 12/06/2013 2.Vulnerability Description Multiple vulnerabilities have been found in this devices: -CVE-2013-3540. Cross Site Request Forgery(CWE-352) and Clickjacking(CAPEC-103) -CVE-2013-3541. Relative Path Traversal(CWE-23). -CVE-2013-3686. Information Exposure(CWE-200) and Permissions, Priveleges and Access Controls(CWE-264) -CVE-2013-3687. Clear Text Storage of Sensitive Information(CWE-312) -CVE-2013-3691. Denial of Service 3.Affected Products CVE-2013-3541, CVE-2013-3686, the following product is affected: WL2600CAM CVE-2013-3540, CVE-2013-3687, the following products are affected: POE2600HD, POE250HD, POE200HD, OD-325HD, OD-2025HD, OD-2060HD, POE100HD. It\x92s possible others models are affected but they were not checked. 4.PoC 4.1.Cross Site Request Forgery (CSRF) CVE-2013-3540 CSRF via GET method. Targeted attack to any administrator. A malicious user can try targeted attacks by sending a special CSRF vector. This allows you to manipulate web interface parameters. In the following example we will make a vector to create an alternative user with administration credentials. _____________________________________________________________________________ http://xx.xx.xx.xx/cgi-bin/admin/usrgrp.cgi?user=test1&pwd=test1&grp=administrator&sgrp=ptz&action=add&redirect= _____________________________________________________________________________ 4.2.Relative Path Traversal CVE-2013-3541, Transversal Path that\x92s allow you to read file system configuration. _____________________________________________________________________________ http://xx.xx.xx.xx/cgi-bin/admin/fileread?READ.filePath=../../../../etc/passwd _____________________________________________________________________________ 4.3.Sensitive Information Exposure + Privilege Escalation CVE-2013-3686, Sensitive Exposure of sensitive data by writing the following URL _____________________________________________________________________________ http://xx.xx.xx.xx/cgi-bin/operator/param?action=list&group=General.UserID _____________________________________________________________________________ We can decode Admin password (base64). Now we can relogin like admin user and we have made the escalation privilege 4.4.Clear Text Storage of Sensitive Information CVE-2013-3687 You can find all the sensitive information about the device in plain text inside the backup file. You can open with any text editor and look for user's information for example, passwords, users and so on. 4.5.Denial of Service (DoS) Use CVE-2013-3691, DoS by overbuffing path \x91/\x92. A request with a large number of \x91a\x92 can take down the http service from the camera device. _____________________________________________________________________________ Request: http://xx.xx.xx.xx/[a*3000] _____________________________________________________________________________ You will get the next message, Conexion has been reset. After remove de adds and refresh it you will get the next message, Can't Connect It will be down for around 2min but if we are doing the request once and again each 1min for example, the camera won\x92t recuperate ever itself The following Python script could be used to test the DoS: _____________________________________________________________________________ @ request = 'GET /' + \x91A\x92 * 3000 + '.html HTTP/1.0\r\n' @ s = socket.socket() @ s.connect((cam_ip, 80)) @ s.send(request) @ response = s.recv(1024) @ s.close() _____________________________________________________________________________ 5.Credits -CVE-2013-3541 was discovered by Eliezer Varad\xe9 Lopez, Javier Repiso S\xe1nchez and Jon\xe1s Ropero Castillo. -CVE-2013-3691 was discovered by Javier Repiso S\xe1nchez and Jon\xe1s Ropero Castillo -CVE-2013-3540, CVE-2013-3686, CVE-2013-3687 was discovered by Jon\xe1s Ropero Castillo. 6.Report Timeline -2013-05-31: Students team notifies the Airlive Customer Support of the vulnerabilities. No reply received. -2013-06-03: Students asks for a reply. -2013-06-05: Airlive team reports to the technical support to analyze the vulnerabilities. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201308-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Wireshark: Multiple vulnerabilities Date: August 28, 2013 Bugs: #398549, #427964, #431572, #433990, #470262, #472762, #478694 ID: 201308-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Wireshark, allowing remote attackers to execute arbitrary code or cause Denial of Service. Background ========== Wireshark is a versatile network protocol analyzer. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-analyzer/wireshark < 1.10.1 >= 1.10.1 *>= 1.8.9 Description =========== Multiple vulnerabilities have been discovered in Wireshark. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All Wireshark 1.10 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.10.1" All Wireshark 1.8 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.8.9" References ========== [ 1 ] CVE-2012-0041 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0041 [ 2 ] CVE-2012-0042 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0042 [ 3 ] CVE-2012-0043 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0043 [ 4 ] CVE-2012-0066 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0066 [ 5 ] CVE-2012-0067 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0067 [ 6 ] CVE-2012-0068 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0068 [ 7 ] CVE-2012-3548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3548 [ 8 ] CVE-2012-4048 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4048 [ 9 ] CVE-2012-4049 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4049 [ 10 ] CVE-2012-4285 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4285 [ 11 ] CVE-2012-4286 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4286 [ 12 ] CVE-2012-4287 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4287 [ 13 ] CVE-2012-4288 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4288 [ 14 ] CVE-2012-4289 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4289 [ 15 ] CVE-2012-4290 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4290 [ 16 ] CVE-2012-4291 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4291 [ 17 ] CVE-2012-4292 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4292 [ 18 ] CVE-2012-4293 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4293 [ 19 ] CVE-2012-4294 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4294 [ 20 ] CVE-2012-4295 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4295 [ 21 ] CVE-2012-4296 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4296 [ 22 ] CVE-2012-4297 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4297 [ 23 ] CVE-2012-4298 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4298 [ 24 ] CVE-2013-3540 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3540 [ 25 ] CVE-2013-3541 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3541 [ 26 ] CVE-2013-3542 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3542 [ 27 ] CVE-2013-3555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3555 [ 28 ] CVE-2013-3556 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3556 [ 29 ] CVE-2013-3557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3557 [ 30 ] CVE-2013-3558 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3558 [ 31 ] CVE-2013-3559 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3559 [ 32 ] CVE-2013-4074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4074 [ 33 ] CVE-2013-4075 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4075 [ 34 ] CVE-2013-4076 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4076 [ 35 ] CVE-2013-4077 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4077 [ 36 ] CVE-2013-4078 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4078 [ 37 ] CVE-2013-4079 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4079 [ 38 ] CVE-2013-4080 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4080 [ 39 ] CVE-2013-4081 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4081 [ 40 ] CVE-2013-4082 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4082 [ 41 ] CVE-2013-4083 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4083 [ 42 ] CVE-2013-4920 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4920 [ 43 ] CVE-2013-4921 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4921 [ 44 ] CVE-2013-4922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4922 [ 45 ] CVE-2013-4923 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4923 [ 46 ] CVE-2013-4924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4924 [ 47 ] CVE-2013-4925 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4925 [ 48 ] CVE-2013-4926 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4926 [ 49 ] CVE-2013-4927 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4927 [ 50 ] CVE-2013-4928 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4928 [ 51 ] CVE-2013-4929 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4929 [ 52 ] CVE-2013-4930 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4930 [ 53 ] CVE-2013-4931 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4931 [ 54 ] CVE-2013-4932 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4932 [ 55 ] CVE-2013-4933 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4933 [ 56 ] CVE-2013-4934 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4934 [ 57 ] CVE-2013-4935 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4935 [ 58 ] CVE-2013-4936 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4936 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201308-05.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.61

sources: NVD: CVE-2013-3540 // JVNDB: JVNDB-2013-004510 // CNVD: CNVD-2013-07669 // BID: 60547 // PACKETSTORM: 122001 // PACKETSTORM: 122983

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

category:['camera device']sub_category:camera

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2013-07669

AFFECTED PRODUCTS

vendor:ovislinkmodel:airlive poe250hdscope:eqversion: -

Trust: 1.6

vendor:ovislinkmodel:airlive od-2025hdscope:eqversion: -

Trust: 1.6

vendor:ovislinkmodel:airlive poe100hdscope:eqversion: -

Trust: 1.6

vendor:ovislinkmodel:airlive poe200hdscope:eqversion: -

Trust: 1.6

vendor:ovislinkmodel:airlive od-2060hdscope:eqversion: -

Trust: 1.6

vendor:ovislinkmodel:airlive poe2600hdscope:eqversion: -

Trust: 1.6

vendor:ovislinkmodel:od-2025hdscope: - version: -

Trust: 0.8

vendor:ovislinkmodel:od-2060hdscope: - version: -

Trust: 0.8

vendor:ovislinkmodel:od-325hdscope: - version: -

Trust: 0.8

vendor:ovislinkmodel:poe-100hdscope: - version: -

Trust: 0.8

vendor:ovislinkmodel:poe-200hdscope: - version: -

Trust: 0.8

vendor:ovislinkmodel:poe-250hdscope: - version: -

Trust: 0.8

vendor:ovislinkmodel:poe-2600hdscope: - version: -

Trust: 0.8

vendor:airlivemodel:ip camera poe100hdscope: - version: -

Trust: 0.6

vendor:airlivemodel:ip camera od-2060hdscope: - version: -

Trust: 0.6

vendor:airlivemodel:ip camera od-2025hdscope: - version: -

Trust: 0.6

vendor:airlivemodel:ip camera od-325hdscope: - version: -

Trust: 0.6

vendor:airlivemodel:ip camera poe200hdscope: - version: -

Trust: 0.6

vendor:airlivemodel:ip camera poe250hdscope: - version: -

Trust: 0.6

vendor:airlivemodel:ip camera poe2600hdscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2013-07669 // JVNDB: JVNDB-2013-004510 // CNNVD: CNNVD-201306-345 // NVD: CVE-2013-3540

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-3540
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-3540
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2013-07669
value: LOW

Trust: 0.6

CNNVD: CNNVD-201306-345
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2013-3540
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-07669
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2013-07669 // JVNDB: JVNDB-2013-004510 // CNNVD: CNNVD-201306-345 // NVD: CVE-2013-3540

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.8

sources: JVNDB: JVNDB-2013-004510 // NVD: CVE-2013-3540

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 122983 // CNNVD: CNNVD-201306-345

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201306-345

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-004510

PATCH

title:Airlive IP Kameryurl:http://cz.airlive.com/product/category/Network-Surveillance

Trust: 0.8

sources: JVNDB: JVNDB-2013-004510

EXTERNAL IDS

db:NVDid:CVE-2013-3540

Trust: 3.6

db:BIDid:60547

Trust: 1.5

db:JVNDBid:JVNDB-2013-004510

Trust: 0.8

db:CNVDid:CNVD-2013-07669

Trust: 0.6

db:FULLDISCid:20130612 SECURITY ANALYSIS OF IP VIDEO SURVEILLANCE CAMERAS

Trust: 0.6

db:CNNVDid:CNNVD-201306-345

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:PACKETSTORMid:122001

Trust: 0.1

db:PACKETSTORMid:122983

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2013-07669 // BID: 60547 // JVNDB: JVNDB-2013-004510 // PACKETSTORM: 122001 // PACKETSTORM: 122983 // CNNVD: CNNVD-201306-345 // NVD: CVE-2013-3540

REFERENCES

url:http://seclists.org/fulldisclosure/2013/jun/84

Trust: 3.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3540

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3540

Trust: 0.8

url:http://www.securityfocus.com/bid/60547

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2013-3541

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-3540

Trust: 0.2

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:http://xx.xx.xx.xx/cgi-bin/admin/usrgrp.cgi?user=test1&pwd=test1&grp=administrator&sgrp=ptz&action=add&redirect=

Trust: 0.1

url:http://xx.xx.xx.xx/cgi-bin/operator/param?action=list&group=general.userid

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-3687

Trust: 0.1

url:http://xx.xx.xx.xx/cgi-bin/admin/fileread?read.filepath=../../../../etc/passwd

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-3686

Trust: 0.1

url:http://xx.xx.xx.xx/[a*3000]

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4933

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4288

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4049

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-3542

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4292

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0066

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4081

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4292

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0068

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4922

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4298

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4289

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4296

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0042

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0043

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4924

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4078

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4297

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4932

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4287

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4080

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4082

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0041

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4287

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4931

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3556

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0043

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3548

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4048

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4928

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0042

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4285

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0067

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4291

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0068

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4083

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4936

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4926

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4923

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4920

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4286

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3558

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4927

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4935

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4074

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-3556

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4295

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4294

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4048

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4295

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4286

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4077

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4291

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3555

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4929

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4921

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3559

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3557

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4285

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4049

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201308-05.xml

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4289

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4290

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3542

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0041

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4294

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4076

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4925

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4934

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4290

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4075

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4296

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-3555

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3540

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4930

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0067

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4298

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0066

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3541

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4288

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4297

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4079

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2013-07669 // JVNDB: JVNDB-2013-004510 // PACKETSTORM: 122001 // PACKETSTORM: 122983 // CNNVD: CNNVD-201306-345 // NVD: CVE-2013-3540

CREDITS

Jons Ropero Castillo

Trust: 0.6

sources: CNNVD: CNNVD-201306-345

SOURCES

db:OTHERid: -
db:CNVDid:CNVD-2013-07669
db:BIDid:60547
db:JVNDBid:JVNDB-2013-004510
db:PACKETSTORMid:122001
db:PACKETSTORMid:122983
db:CNNVDid:CNNVD-201306-345
db:NVDid:CVE-2013-3540

LAST UPDATE DATE

2025-04-11T21:12:34.660000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-07669date:2013-06-20T00:00:00
db:BIDid:60547date:2013-08-30T00:13:00
db:JVNDBid:JVNDB-2013-004510date:2013-10-08T00:00:00
db:CNNVDid:CNNVD-201306-345date:2022-03-21T00:00:00
db:NVDid:CVE-2013-3540date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-07669date:2013-06-20T00:00:00
db:BIDid:60547date:2013-06-12T00:00:00
db:JVNDBid:JVNDB-2013-004510date:2013-10-08T00:00:00
db:PACKETSTORMid:122001date:2013-06-13T05:42:00
db:PACKETSTORMid:122983date:2013-08-29T02:49:21
db:CNNVDid:CNNVD-201306-345date:2013-06-24T00:00:00
db:NVDid:CVE-2013-3540date:2013-10-04T23:55:03.830