ID

VAR-201310-0240


CVE

CVE-2013-3541


TITLE

AirLive WL-2600CAM Model of cgi-bin/admin/fileread Vulnerable to directory traversal

Trust: 0.8

sources: JVNDB: JVNDB-2013-004511

DESCRIPTION

Directory traversal vulnerability in cgi-bin/admin/fileread in AirLive WL2600CAM and possibly other camera models allows remote attackers to read arbitrary files via a .. (dot dot) in the READ.filePath parameter. AirLive WL-2600CAM And other models cgi-bin/admin/fileread Contains a directory traversal vulnerability.By a third party .. Airlive IP Camera is an IP camera device. AirLive WL-2600CAM is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. A remote attacker can exploit this issue to obtain sensitive information that could aid in further attacks. =========================================================================== AIRLIVE ==================================================================== =========================================================================== 1.Advisory Information Title: Airlive Multiple Vulnerabilities Date Published: 12/06/2013 Date of last updated: 12/06/2013 2.Vulnerability Description Multiple vulnerabilities have been found in this devices: -CVE-2013-3540. Cross Site Request Forgery(CWE-352) and Clickjacking(CAPEC-103) -CVE-2013-3541. Relative Path Traversal(CWE-23). -CVE-2013-3686. Information Exposure(CWE-200) and Permissions, Priveleges and Access Controls(CWE-264) -CVE-2013-3687. Clear Text Storage of Sensitive Information(CWE-312) -CVE-2013-3691. Denial of Service 3.Affected Products CVE-2013-3541, CVE-2013-3686, the following product is affected: WL2600CAM CVE-2013-3540, CVE-2013-3687, the following products are affected: POE2600HD, POE250HD, POE200HD, OD-325HD, OD-2025HD, OD-2060HD, POE100HD. It\x92s possible others models are affected but they were not checked. 4.PoC 4.1.Cross Site Request Forgery (CSRF) CVE-2013-3540 CSRF via GET method. Targeted attack to any administrator. These cameras use a web interface which is prone to CSRF vulnerabilities. A malicious user can try targeted attacks by sending a special CSRF vector. This allows you to manipulate web interface parameters. In the following example we will make a vector to create an alternative user with administration credentials. _____________________________________________________________________________ http://xx.xx.xx.xx/cgi-bin/admin/usrgrp.cgi?user=test1&pwd=test1&grp=administrator&sgrp=ptz&action=add&redirect= _____________________________________________________________________________ 4.2.Relative Path Traversal CVE-2013-3541, Transversal Path that\x92s allow you to read file system configuration. _____________________________________________________________________________ http://xx.xx.xx.xx/cgi-bin/admin/fileread?READ.filePath=../../../../etc/passwd _____________________________________________________________________________ 4.3.Sensitive Information Exposure + Privilege Escalation CVE-2013-3686, Sensitive Exposure of sensitive data by writing the following URL _____________________________________________________________________________ http://xx.xx.xx.xx/cgi-bin/operator/param?action=list&group=General.UserID _____________________________________________________________________________ We can decode Admin password (base64). Now we can relogin like admin user and we have made the escalation privilege 4.4.Clear Text Storage of Sensitive Information CVE-2013-3687 You can find all the sensitive information about the device in plain text inside the backup file. You can open with any text editor and look for user's information for example, passwords, users and so on. 4.5.Denial of Service (DoS) Use CVE-2013-3691, DoS by overbuffing path \x91/\x92. A request with a large number of \x91a\x92 can take down the http service from the camera device. _____________________________________________________________________________ Request: http://xx.xx.xx.xx/[a*3000] _____________________________________________________________________________ You will get the next message, Conexion has been reset. After remove de adds and refresh it you will get the next message, Can't Connect It will be down for around 2min but if we are doing the request once and again each 1min for example, the camera won\x92t recuperate ever itself The following Python script could be used to test the DoS: _____________________________________________________________________________ @ request = 'GET /' + \x91A\x92 * 3000 + '.html HTTP/1.0\r\n' @ s = socket.socket() @ s.connect((cam_ip, 80)) @ s.send(request) @ response = s.recv(1024) @ s.close() _____________________________________________________________________________ 5.Credits -CVE-2013-3541 was discovered by Eliezer Varad\xe9 Lopez, Javier Repiso S\xe1nchez and Jon\xe1s Ropero Castillo. -CVE-2013-3691 was discovered by Javier Repiso S\xe1nchez and Jon\xe1s Ropero Castillo -CVE-2013-3540, CVE-2013-3686, CVE-2013-3687 was discovered by Jon\xe1s Ropero Castillo. 6.Report Timeline -2013-05-31: Students team notifies the Airlive Customer Support of the vulnerabilities. No reply received. -2013-06-03: Students asks for a reply. -2013-06-05: Airlive team reports to the technical support to analyze the vulnerabilities. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201308-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Wireshark: Multiple vulnerabilities Date: August 28, 2013 Bugs: #398549, #427964, #431572, #433990, #470262, #472762, #478694 ID: 201308-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Wireshark, allowing remote attackers to execute arbitrary code or cause Denial of Service. Background ========== Wireshark is a versatile network protocol analyzer. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-analyzer/wireshark < 1.10.1 >= 1.10.1 *>= 1.8.9 Description =========== Multiple vulnerabilities have been discovered in Wireshark. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All Wireshark 1.10 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.10.1" All Wireshark 1.8 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.8.9" References ========== [ 1 ] CVE-2012-0041 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0041 [ 2 ] CVE-2012-0042 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0042 [ 3 ] CVE-2012-0043 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0043 [ 4 ] CVE-2012-0066 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0066 [ 5 ] CVE-2012-0067 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0067 [ 6 ] CVE-2012-0068 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0068 [ 7 ] CVE-2012-3548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3548 [ 8 ] CVE-2012-4048 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4048 [ 9 ] CVE-2012-4049 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4049 [ 10 ] CVE-2012-4285 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4285 [ 11 ] CVE-2012-4286 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4286 [ 12 ] CVE-2012-4287 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4287 [ 13 ] CVE-2012-4288 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4288 [ 14 ] CVE-2012-4289 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4289 [ 15 ] CVE-2012-4290 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4290 [ 16 ] CVE-2012-4291 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4291 [ 17 ] CVE-2012-4292 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4292 [ 18 ] CVE-2012-4293 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4293 [ 19 ] CVE-2012-4294 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4294 [ 20 ] CVE-2012-4295 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4295 [ 21 ] CVE-2012-4296 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4296 [ 22 ] CVE-2012-4297 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4297 [ 23 ] CVE-2012-4298 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4298 [ 24 ] CVE-2013-3540 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3540 [ 25 ] CVE-2013-3541 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3541 [ 26 ] CVE-2013-3542 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3542 [ 27 ] CVE-2013-3555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3555 [ 28 ] CVE-2013-3556 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3556 [ 29 ] CVE-2013-3557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3557 [ 30 ] CVE-2013-3558 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3558 [ 31 ] CVE-2013-3559 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3559 [ 32 ] CVE-2013-4074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4074 [ 33 ] CVE-2013-4075 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4075 [ 34 ] CVE-2013-4076 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4076 [ 35 ] CVE-2013-4077 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4077 [ 36 ] CVE-2013-4078 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4078 [ 37 ] CVE-2013-4079 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4079 [ 38 ] CVE-2013-4080 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4080 [ 39 ] CVE-2013-4081 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4081 [ 40 ] CVE-2013-4082 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4082 [ 41 ] CVE-2013-4083 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4083 [ 42 ] CVE-2013-4920 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4920 [ 43 ] CVE-2013-4921 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4921 [ 44 ] CVE-2013-4922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4922 [ 45 ] CVE-2013-4923 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4923 [ 46 ] CVE-2013-4924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4924 [ 47 ] CVE-2013-4925 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4925 [ 48 ] CVE-2013-4926 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4926 [ 49 ] CVE-2013-4927 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4927 [ 50 ] CVE-2013-4928 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4928 [ 51 ] CVE-2013-4929 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4929 [ 52 ] CVE-2013-4930 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4930 [ 53 ] CVE-2013-4931 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4931 [ 54 ] CVE-2013-4932 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4932 [ 55 ] CVE-2013-4933 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4933 [ 56 ] CVE-2013-4934 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4934 [ 57 ] CVE-2013-4935 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4935 [ 58 ] CVE-2013-4936 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4936 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201308-05.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.61

sources: NVD: CVE-2013-3541 // JVNDB: JVNDB-2013-004511 // CNVD: CNVD-2013-07700 // BID: 60549 // PACKETSTORM: 122001 // PACKETSTORM: 122983

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

category:['camera device']sub_category:camera

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2013-07700

AFFECTED PRODUCTS

vendor:ovislinkmodel:airlive wl2600camscope:eqversion: -

Trust: 1.6

vendor:ovislinkmodel:wl-2600camscope: - version: -

Trust: 0.8

vendor:airlivemodel:wl2600camscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2013-07700 // JVNDB: JVNDB-2013-004511 // CNNVD: CNNVD-201306-346 // NVD: CVE-2013-3541

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-3541
value: HIGH

Trust: 1.0

NVD: CVE-2013-3541
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-07700
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201306-346
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2013-3541
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-07700
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2013-07700 // JVNDB: JVNDB-2013-004511 // CNNVD: CNNVD-201306-346 // NVD: CVE-2013-3541

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.8

sources: JVNDB: JVNDB-2013-004511 // NVD: CVE-2013-3541

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 122983 // CNNVD: CNNVD-201306-346

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201306-346

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-004511

PATCH

title:WL-2600CAMurl:http://cz.airlive.com/product/WL-2600CAM

Trust: 0.8

sources: JVNDB: JVNDB-2013-004511

EXTERNAL IDS

db:NVDid:CVE-2013-3541

Trust: 3.6

db:BIDid:60549

Trust: 1.5

db:JVNDBid:JVNDB-2013-004511

Trust: 0.8

db:CNVDid:CNVD-2013-07700

Trust: 0.6

db:FULLDISCid:20130612 SECURITY ANALYSIS OF IP VIDEO SURVEILLANCE CAMERAS

Trust: 0.6

db:CNNVDid:CNNVD-201306-346

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:PACKETSTORMid:122001

Trust: 0.1

db:PACKETSTORMid:122983

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2013-07700 // BID: 60549 // JVNDB: JVNDB-2013-004511 // PACKETSTORM: 122001 // PACKETSTORM: 122983 // CNNVD: CNNVD-201306-346 // NVD: CVE-2013-3541

REFERENCES

url:http://seclists.org/fulldisclosure/2013/jun/84

Trust: 3.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3541

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3541

Trust: 0.8

url:http://www.securityfocus.com/bid/60549

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2013-3541

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-3540

Trust: 0.2

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:http://xx.xx.xx.xx/cgi-bin/admin/usrgrp.cgi?user=test1&pwd=test1&grp=administrator&sgrp=ptz&action=add&redirect=

Trust: 0.1

url:http://xx.xx.xx.xx/cgi-bin/operator/param?action=list&group=general.userid

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-3687

Trust: 0.1

url:http://xx.xx.xx.xx/cgi-bin/admin/fileread?read.filepath=../../../../etc/passwd

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-3686

Trust: 0.1

url:http://xx.xx.xx.xx/[a*3000]

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4933

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4288

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4049

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-3542

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4292

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0066

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4081

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4292

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0068

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4922

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4298

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4289

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4296

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0042

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0043

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4924

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4078

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4297

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4932

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4287

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4080

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4082

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0041

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4287

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4931

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3556

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0043

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3548

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4048

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4928

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0042

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4285

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0067

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4291

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0068

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4083

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4936

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4926

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4923

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4920

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4286

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3558

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4927

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4935

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4074

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-3556

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4295

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4294

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4048

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4295

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4286

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4077

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4291

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3555

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4929

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4921

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3559

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3557

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4285

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4049

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201308-05.xml

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4289

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4290

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3542

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0041

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4294

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4076

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4925

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4934

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4290

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4075

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4296

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-3555

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3540

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4930

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0067

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4298

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0066

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3541

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4288

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4297

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4079

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2013-07700 // JVNDB: JVNDB-2013-004511 // PACKETSTORM: 122001 // PACKETSTORM: 122983 // CNNVD: CNNVD-201306-346 // NVD: CVE-2013-3541

CREDITS

Eliezer VaradA Lopez, Javier Repiso Snchez and Jon??s Ropero Castillo

Trust: 0.6

sources: CNNVD: CNNVD-201306-346

SOURCES

db:OTHERid: -
db:CNVDid:CNVD-2013-07700
db:BIDid:60549
db:JVNDBid:JVNDB-2013-004511
db:PACKETSTORMid:122001
db:PACKETSTORMid:122983
db:CNNVDid:CNNVD-201306-346
db:NVDid:CVE-2013-3541

LAST UPDATE DATE

2025-01-30T21:17:33.052000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-07700date:2013-06-20T00:00:00
db:BIDid:60549date:2013-08-30T00:13:00
db:JVNDBid:JVNDB-2013-004511date:2013-10-08T00:00:00
db:CNNVDid:CNNVD-201306-346date:2013-10-08T00:00:00
db:NVDid:CVE-2013-3541date:2024-11-21T01:53:51.413

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-07700date:2013-06-20T00:00:00
db:BIDid:60549date:2013-06-12T00:00:00
db:JVNDBid:JVNDB-2013-004511date:2013-10-08T00:00:00
db:PACKETSTORMid:122001date:2013-06-13T05:42:00
db:PACKETSTORMid:122983date:2013-08-29T02:49:21
db:CNNVDid:CNNVD-201306-346date:2013-06-20T00:00:00
db:NVDid:CVE-2013-3541date:2013-10-04T23:55:03.877