ID

VAR-201703-0363


CVE

CVE-2014-3931


TITLE

MRLG of fastping.c Vulnerable to arbitrary memory writing

Trust: 0.8

sources: JVNDB: JVNDB-2014-008245

DESCRIPTION

fastping.c in MRLG (aka Multi-Router Looking Glass) before 5.5.0 allows remote attackers to cause an arbitrary memory write and memory corruption. MRLG (also known as Multi-Router Looking Glass) is a set of tools for network operators to query network elements. The fastping.c file in versions prior to MRLG 5.5.0 has a security vulnerability

Trust: 1.8

sources: NVD: CVE-2014-3931 // JVNDB: JVNDB-2014-008245 // VULHUB: VHN-71871 // VULMON: CVE-2014-3931

AFFECTED PRODUCTS

vendor:multi router looking glassmodel:multi-router looking glassscope:lteversion:5.4.1

Trust: 1.0

vendor:multi router looking glassmodel:multi-router looking glassscope:ltversion:5.5.0

Trust: 0.8

vendor:multi router looking glassmodel:multi-router looking glassscope:eqversion:5.4.1

Trust: 0.6

sources: JVNDB: JVNDB-2014-008245 // NVD: CVE-2014-3931 // CNNVD: CNNVD-201703-1414

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2014-3931
value: CRITICAL

Trust: 1.8

CNNVD: CNNVD-201703-1414
value: HIGH

Trust: 0.6

VULHUB: VHN-71871
value: HIGH

Trust: 0.1

VULMON: CVE-2014-3931
value: HIGH

Trust: 0.1

NVD:
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2014-3931
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.9

VULHUB: VHN-71871
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

NVD:
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: CVE-2014-3931
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-71871 // VULMON: CVE-2014-3931 // JVNDB: JVNDB-2014-008245 // NVD: CVE-2014-3931 // CNNVD: CNNVD-201703-1414

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-71871 // JVNDB: JVNDB-2014-008245 // NVD: CVE-2014-3931

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201703-1414

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201703-1414

CONFIGURATIONS

sources: NVD: CVE-2014-3931

PATCH

title:Top Pageurl:http://mrlg.op-sec.us/

Trust: 0.8

title:MRLG Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=68911

Trust: 0.6

title: - url:https://github.com/aravindb26/new.txt

Trust: 0.1

sources: VULMON: CVE-2014-3931 // JVNDB: JVNDB-2014-008245 // CNNVD: CNNVD-201703-1414

EXTERNAL IDS

db:NVDid:CVE-2014-3931

Trust: 2.6

db:HACKERONEid:16330

Trust: 1.8

db:JVNDBid:JVNDB-2014-008245

Trust: 0.8

db:CNNVDid:CNNVD-201703-1414

Trust: 0.7

db:VULHUBid:VHN-71871

Trust: 0.1

db:VULMONid:CVE-2014-3931

Trust: 0.1

sources: VULHUB: VHN-71871 // VULMON: CVE-2014-3931 // JVNDB: JVNDB-2014-008245 // NVD: CVE-2014-3931 // CNNVD: CNNVD-201703-1414

REFERENCES

url:http://mrlg.op-sec.us/

Trust: 1.8

url:http://www.s3.eurecom.fr/cve/cve-2014-3931.txt

Trust: 1.8

url:https://hackerone.com/reports/16330

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3931

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-3931

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/aravindb26/new.txt

Trust: 0.1

sources: VULHUB: VHN-71871 // VULMON: CVE-2014-3931 // JVNDB: JVNDB-2014-008245 // NVD: CVE-2014-3931 // CNNVD: CNNVD-201703-1414

SOURCES

db:VULHUBid:VHN-71871
db:VULMONid:CVE-2014-3931
db:JVNDBid:JVNDB-2014-008245
db:NVDid:CVE-2014-3931
db:CNNVDid:CNNVD-201703-1414

LAST UPDATE DATE

2023-12-18T12:29:43.467000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-71871date:2017-04-04T00:00:00
db:VULMONid:CVE-2014-3931date:2017-04-04T00:00:00
db:JVNDBid:JVNDB-2014-008245date:2017-04-28T00:00:00
db:NVDid:CVE-2014-3931date:2017-04-04T18:05:19.480
db:CNNVDid:CNNVD-201703-1414date:2017-04-01T00:00:00

SOURCES RELEASE DATE

db:VULHUBid:VHN-71871date:2017-03-31T00:00:00
db:VULMONid:CVE-2014-3931date:2017-03-31T00:00:00
db:JVNDBid:JVNDB-2014-008245date:2017-04-28T00:00:00
db:NVDid:CVE-2014-3931date:2017-03-31T16:59:00.237
db:CNNVDid:CNNVD-201703-1414date:2017-03-31T00:00:00