ID

VAR-201301-0158


CVE

CVE-2012-6441


TITLE

Rockwell Automation ControlLogix Information Disclosure Vulnerability

Trust: 1.4

sources: IVD: 206f3a64-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-00293 // CNNVD: CNNVD-201301-251

DESCRIPTION

Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to obtain sensitive information via a crafted CIP packet. plural Rockwell Automation There are vulnerabilities in products that can capture important information.Skillfully crafted by a third party CIP Important information may be obtained through the packet. Rockwell Automation MicroLogix is a programmable controller platform. When the device receives a special request, it will disclose sensitive information. Rockwell's products are affected by this vulnerability: all EtherNet/IP products that comply with CIP and EtherNet/IP specifications. Allow arbitrary code execution or denial of service attacks. Rockwell Automation Controllogix has an input validation attack that allows an attacker to submit a malformed request to crash an application and require a physical restart for normal functionality. A security vulnerability exists in the Rockwell Automation Controllogix module startup code. Allow leaks of data. An attacker can exploit these issues to crash the affected application, denying service to legitimate users. Information obtained may aid in further attacks. ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Rockwell Automation ControlLogix Multiple Vulnerabilities SECUNIA ADVISORY ID: SA47737 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47737/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47737 RELEASE DATE: 2012-01-23 DISCUSS ADVISORY: http://secunia.com/advisories/47737/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47737/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47737 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Rockwell Automation ControlLogix, which can be exploited by malicious people to disclose system information, cause a DoS (Denial of Service), and compromise a vulnerable device. 1) An input validation error when processing certain commands can be exploited to cause a device to stop responding. 2) An input validation error when processing certain packets can be exploited to cause a device to stop responding. 3) An error when processing interface control commands can be exploited to cause a device to stop responding. 4) An error when processing the stop command can be exploited to cause a device to stop responding. 5) An error when processing the dump command can be exploited to disclose the device's boot code, which may contain sensitive information. 6) An error when processing the reset command can be exploited to cause a device to stop responding. SOLUTION: Restrict access to trusted hosts only. PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Ruben Santamarta via Digital Bond\x92s SCADA Security Scientific Symposium (S4). ORIGINAL ADVISORY: ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICS-Alert-12-020-02.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 5.22

sources: NVD: CVE-2012-6441 // JVNDB: JVNDB-2013-001269 // CNVD: CNVD-2013-00293 // CNVD: CNVD-2012-0368 // CNVD: CNVD-2012-0326 // CNVD: CNVD-2012-0367 // BID: 51603 // BID: 57307 // IVD: 206f3a64-2353-11e6-abef-000c29c66e3d // IVD: 93f6af48-1f76-11e6-abef-000c29c66e3d // IVD: 22579fc2-1f77-11e6-abef-000c29c66e3d // IVD: 92c985fa-1f76-11e6-abef-000c29c66e3d // VULHUB: VHN-59722 // PACKETSTORM: 108984

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 3.2

sources: IVD: 206f3a64-2353-11e6-abef-000c29c66e3d // IVD: 93f6af48-1f76-11e6-abef-000c29c66e3d // IVD: 22579fc2-1f77-11e6-abef-000c29c66e3d // IVD: 92c985fa-1f76-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-00293 // CNVD: CNVD-2012-0368 // CNVD: CNVD-2012-0326 // CNVD: CNVD-2012-0367

AFFECTED PRODUCTS

vendor:rockwellmodel:automation controllogixscope:eqversion:0

Trust: 2.7

vendor:rockwellautomationmodel:1756-ewebscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:controllogixscope:lteversion:18

Trust: 1.0

vendor:rockwellautomationmodel:compactlogix l35e controllerscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1768-ewebscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:compactlogix controllersscope:lteversion:19

Trust: 1.0

vendor:rockwellautomationmodel:guardlogix controllersscope:lteversion:20

Trust: 1.0

vendor:rockwellautomationmodel:controllogix controllersscope:lteversion:20

Trust: 1.0

vendor:rockwellautomationmodel:compactlogixscope:lteversion:18

Trust: 1.0

vendor:rockwellautomationmodel:guardlogixscope:lteversion:18

Trust: 1.0

vendor:rockwellautomationmodel:micrologixscope:lteversion:1400

Trust: 1.0

vendor:rockwellautomationmodel:softlogixscope:lteversion:18

Trust: 1.0

vendor:rockwellautomationmodel:softlogix controllersscope:lteversion:19

Trust: 1.0

vendor:rockwellautomationmodel:1756-enbtscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:flexlogix 1788-enbt adapterscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1768-enbtscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1794-aentr flex i\/o ethernet\/ip adapterscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:micrologixscope:lteversion:1100

Trust: 1.0

vendor:rockwellautomationmodel:compactlogix l32e controllerscope:eqversion: -

Trust: 1.0

vendor:rockwell automationmodel:1756-enbtscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1756-ewebscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1768-enbtscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1768-ewebscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:compactlogix l32e controllerscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:compactlogix l35e controllerscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:compactlogix controllerscope:lteversion:18

Trust: 0.8

vendor:rockwell automationmodel:compactlogix controllerscope:lteversion:19

Trust: 0.8

vendor:rockwell automationmodel:controllogix controllerscope:lteversion:18

Trust: 0.8

vendor:rockwell automationmodel:controllogix controllerscope:lteversion:20

Trust: 0.8

vendor:rockwell automationmodel:flex i/o ethernet/ip adapter 1794-aentrscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:flexlogix 1788-enbtscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:guardlogix controllerscope:lteversion:18

Trust: 0.8

vendor:rockwell automationmodel:guardlogix controllerscope:lteversion:20

Trust: 0.8

vendor:rockwell automationmodel:micrologixscope:eqversion:1100

Trust: 0.8

vendor:rockwell automationmodel:micrologixscope:eqversion:1400

Trust: 0.8

vendor:rockwell automationmodel:softlogix controllerscope:lteversion:18

Trust: 0.8

vendor:rockwell automationmodel:softlogix controllerscope:lteversion:19

Trust: 0.8

vendor:rockwellmodel:automation micrologixscope:eqversion:1100

Trust: 0.6

vendor:rockwellmodel:automation micrologixscope:eqversion:1400

Trust: 0.6

vendor:rockwellautomationmodel:guardlogix controllersscope:eqversion:20

Trust: 0.6

vendor:rockwellautomationmodel:compactlogixscope:eqversion:18

Trust: 0.6

vendor:rockwellautomationmodel:controllogixscope:eqversion:18

Trust: 0.6

vendor:rockwellautomationmodel:micrologixscope:eqversion:1100

Trust: 0.6

vendor:rockwellautomationmodel:softlogixscope:eqversion:18

Trust: 0.6

vendor:rockwellautomationmodel:guardlogixscope:eqversion:18

Trust: 0.6

vendor:rockwellautomationmodel:compactlogix controllersscope:eqversion:19

Trust: 0.6

vendor:rockwellautomationmodel:micrologixscope:eqversion:1400

Trust: 0.6

vendor:rockwellautomationmodel:softlogix controllersscope:eqversion:19

Trust: 0.6

vendor:rockwellautomationmodel:controllogix controllersscope:eqversion:20

Trust: 0.6

vendor:micrologixmodel: - scope:eqversion:*

Trust: 0.4

vendor:rockwellmodel:automation micrologixscope:eqversion:14000

Trust: 0.3

vendor:rockwellmodel:automation micrologixscope:eqversion:11000

Trust: 0.3

vendor:controllogix controllersmodel: - scope:eqversion:*

Trust: 0.2

vendor:guardlogix controllersmodel: - scope:eqversion:*

Trust: 0.2

vendor:softlogix controllersmodel: - scope:eqversion:*

Trust: 0.2

vendor:1756 enbtmodel: - scope:eqversion: -

Trust: 0.2

vendor:1756 ewebmodel: - scope:eqversion: -

Trust: 0.2

vendor:1768 enbtmodel: - scope:eqversion: -

Trust: 0.2

vendor:1768 ewebmodel: - scope:eqversion: -

Trust: 0.2

vendor:1794 aentr flex i o ethernet ip adaptermodel: - scope:eqversion: -

Trust: 0.2

vendor:compactlogixmodel: - scope:eqversion:*

Trust: 0.2

vendor:compactlogix controllersmodel: - scope:eqversion:*

Trust: 0.2

vendor:compactlogix l32e controllermodel: - scope:eqversion: -

Trust: 0.2

vendor:compactlogix l35e controllermodel: - scope:eqversion: -

Trust: 0.2

vendor:controllogixmodel: - scope:eqversion:*

Trust: 0.2

vendor:flexlogix 1788 enbt adaptermodel: - scope:eqversion: -

Trust: 0.2

vendor:guardlogixmodel: - scope:eqversion:*

Trust: 0.2

vendor:softlogixmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 206f3a64-2353-11e6-abef-000c29c66e3d // IVD: 93f6af48-1f76-11e6-abef-000c29c66e3d // IVD: 22579fc2-1f77-11e6-abef-000c29c66e3d // IVD: 92c985fa-1f76-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-00293 // CNVD: CNVD-2012-0368 // CNVD: CNVD-2012-0326 // CNVD: CNVD-2012-0367 // BID: 51603 // BID: 57307 // JVNDB: JVNDB-2013-001269 // CNNVD: CNNVD-201301-251 // NVD: CVE-2012-6441

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-6441
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-6441
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201301-251
value: MEDIUM

Trust: 0.6

IVD: 206f3a64-2353-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: 93f6af48-1f76-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: 22579fc2-1f77-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: 92c985fa-1f76-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-59722
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-6441
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 206f3a64-2353-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 93f6af48-1f76-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.3 [IVD]

Trust: 0.2

IVD: 22579fc2-1f77-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.3 [IVD]

Trust: 0.2

IVD: 92c985fa-1f76-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.3 [IVD]

Trust: 0.2

VULHUB: VHN-59722
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 206f3a64-2353-11e6-abef-000c29c66e3d // IVD: 93f6af48-1f76-11e6-abef-000c29c66e3d // IVD: 22579fc2-1f77-11e6-abef-000c29c66e3d // IVD: 92c985fa-1f76-11e6-abef-000c29c66e3d // VULHUB: VHN-59722 // JVNDB: JVNDB-2013-001269 // CNNVD: CNNVD-201301-251 // NVD: CVE-2012-6441

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-59722 // JVNDB: JVNDB-2013-001269 // NVD: CVE-2012-6441

THREAT TYPE

network

Trust: 0.6

sources: BID: 51603 // BID: 57307

TYPE

Design error

Trust: 1.2

sources: IVD: 93f6af48-1f76-11e6-abef-000c29c66e3d // IVD: 22579fc2-1f77-11e6-abef-000c29c66e3d // IVD: 92c985fa-1f76-11e6-abef-000c29c66e3d // BID: 51603 // BID: 57307

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001269

PATCH

title:Top Pageurl:http://www.rockwellautomation.com/

Trust: 0.8

title:Partnerurl:http://jp.rockwellautomation.com/applications/gs/ap/gsjp.nsf/pages/partner

Trust: 0.8

title:Top Pageurl:http://jp.rockwellautomation.com/

Trust: 0.8

title:Rockwell Automation ControlLogix Information Disclosure Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/29253

Trust: 0.6

sources: CNVD: CNVD-2013-00293 // JVNDB: JVNDB-2013-001269

EXTERNAL IDS

db:NVDid:CVE-2012-6441

Trust: 3.6

db:ICS CERTid:ICSA-13-011-03

Trust: 3.1

db:ICS CERT ALERTid:ICS-ALERT-12-020-02

Trust: 2.5

db:BIDid:51603

Trust: 2.1

db:BIDid:57307

Trust: 1.0

db:CNNVDid:CNNVD-201301-251

Trust: 0.9

db:CNVDid:CNVD-2013-00293

Trust: 0.8

db:CNVDid:CNVD-2012-0367

Trust: 0.8

db:CNVDid:CNVD-2012-0326

Trust: 0.8

db:CNVDid:CNVD-2012-0368

Trust: 0.8

db:JVNDBid:JVNDB-2013-001269

Trust: 0.8

db:ICS CERT ALERTid:ICS-ALERT-12-020-02A

Trust: 0.3

db:IVDid:206F3A64-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:93F6AF48-1F76-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:22579FC2-1F77-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:92C985FA-1F76-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:SECUNIAid:47737

Trust: 0.2

db:SEEBUGid:SSVID-89472

Trust: 0.1

db:VULHUBid:VHN-59722

Trust: 0.1

db:PACKETSTORMid:108984

Trust: 0.1

sources: IVD: 206f3a64-2353-11e6-abef-000c29c66e3d // IVD: 93f6af48-1f76-11e6-abef-000c29c66e3d // IVD: 22579fc2-1f77-11e6-abef-000c29c66e3d // IVD: 92c985fa-1f76-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-00293 // CNVD: CNVD-2012-0368 // CNVD: CNVD-2012-0326 // CNVD: CNVD-2012-0367 // VULHUB: VHN-59722 // BID: 51603 // BID: 57307 // JVNDB: JVNDB-2013-001269 // PACKETSTORM: 108984 // CNNVD: CNNVD-201301-251 // NVD: CVE-2012-6441

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-13-011-03.pdf

Trust: 3.1

url:http://www.us-cert.gov/control_systems/pdf/ics-alert-12-020-02.pdf

Trust: 2.5

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6441

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6441

Trust: 0.8

url:http://www.rockwellautomation.com/

Trust: 0.6

url:http://www.securityfocus.com/bid/57307

Trust: 0.6

url:http://www.us-cert.gov/control_systems/pdf/ics-alert-12-020-02a.pdf

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47737

Trust: 0.1

url:http://secunia.com/advisories/47737/

Trust: 0.1

url:http://secunia.com/advisories/47737/#comments

Trust: 0.1

url:http://secunia.com/company/jobs/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2013-00293 // CNVD: CNVD-2012-0368 // CNVD: CNVD-2012-0326 // CNVD: CNVD-2012-0367 // VULHUB: VHN-59722 // BID: 51603 // BID: 57307 // JVNDB: JVNDB-2013-001269 // PACKETSTORM: 108984 // CNNVD: CNNVD-201301-251 // NVD: CVE-2012-6441

CREDITS

Rubén Santamarta

Trust: 0.6

sources: BID: 51603 // BID: 57307

SOURCES

db:IVDid:206f3a64-2353-11e6-abef-000c29c66e3d
db:IVDid:93f6af48-1f76-11e6-abef-000c29c66e3d
db:IVDid:22579fc2-1f77-11e6-abef-000c29c66e3d
db:IVDid:92c985fa-1f76-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2013-00293
db:CNVDid:CNVD-2012-0368
db:CNVDid:CNVD-2012-0326
db:CNVDid:CNVD-2012-0367
db:VULHUBid:VHN-59722
db:BIDid:51603
db:BIDid:57307
db:JVNDBid:JVNDB-2013-001269
db:PACKETSTORMid:108984
db:CNNVDid:CNNVD-201301-251
db:NVDid:CVE-2012-6441

LAST UPDATE DATE

2024-08-14T14:14:28.534000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-00293date:2013-01-17T00:00:00
db:CNVDid:CNVD-2012-0368date:2012-02-02T00:00:00
db:CNVDid:CNVD-2012-0326date:2012-02-01T00:00:00
db:CNVDid:CNVD-2012-0367date:2012-02-02T00:00:00
db:VULHUBid:VHN-59722date:2013-01-25T00:00:00
db:BIDid:51603date:2012-02-15T17:30:00
db:BIDid:57307date:2013-01-14T00:00:00
db:JVNDBid:JVNDB-2013-001269date:2013-01-28T00:00:00
db:CNNVDid:CNNVD-201301-251date:2013-01-16T00:00:00
db:NVDid:CVE-2012-6441date:2013-01-25T16:32:15.853

SOURCES RELEASE DATE

db:IVDid:206f3a64-2353-11e6-abef-000c29c66e3ddate:2013-01-17T00:00:00
db:IVDid:93f6af48-1f76-11e6-abef-000c29c66e3ddate:2012-02-02T00:00:00
db:IVDid:22579fc2-1f77-11e6-abef-000c29c66e3ddate:2012-02-01T00:00:00
db:IVDid:92c985fa-1f76-11e6-abef-000c29c66e3ddate:2012-02-02T00:00:00
db:CNVDid:CNVD-2013-00293date:2013-01-17T00:00:00
db:CNVDid:CNVD-2012-0368date:2012-02-02T00:00:00
db:CNVDid:CNVD-2012-0326date:2012-02-01T00:00:00
db:CNVDid:CNVD-2012-0367date:2012-02-02T00:00:00
db:VULHUBid:VHN-59722date:2013-01-24T00:00:00
db:BIDid:51603date:2012-01-20T00:00:00
db:BIDid:57307date:2013-01-14T00:00:00
db:JVNDBid:JVNDB-2013-001269date:2013-01-28T00:00:00
db:PACKETSTORMid:108984date:2012-01-23T03:48:18
db:CNNVDid:CNNVD-201301-251date:2013-01-16T00:00:00
db:NVDid:CVE-2012-6441date:2013-01-24T21:55:01.727