ID

VAR-201401-0017


CVE

CVE-2012-3000


TITLE

plural F5 BIG-IP Product APM WebGUI and AVR WebGUI In SQL Injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2012-006127

DESCRIPTION

Multiple SQL injection vulnerabilities in sam/admin/reports/php/saveSettings.php in the (1) APM WebGUI in F5 BIG-IP LTM, GTM, ASM, Link Controller, PSM, APM, Edge Gateway, and Analytics and (2) AVR WebGUI in WebAccelerator and WOM 11.2.x before 11.2.0-HF3 and 11.2.x before 11.2.1-HF3 allow remote authenticated users to execute arbitrary SQL commands via the defaultQuery parameter. F5 BIG-IP is an application switch. F5 BIG-IP saveSettings.php fails to properly filter user-submitted input. An authenticated attacker can exploit a vulnerability to submit a malicious SQL query that can access MySQL database information or access system files in the \"mysql\" OS user context. To successfully exploit a vulnerability, you may need to enable Application Security (ASM) or Access Policy (APM). Versions prior to F5 BIG-IP 11.2.0 are vulnerable. F5 BIG-IP LTM, etc. are all products of F5 Company in the United States. LTM is a local traffic manager; GTM is a wide area traffic manager; WebAccelerator is an application accelerator. The vulnerability is caused by the sam/admin/reports/php/saveSettings.php script not adequately filtering the 'defaultQuery' parameter. A remote attacker can exploit this vulnerability to execute arbitrary SQL commands. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: F5 Products "defaultQuery" SQL Injection Vulnerability SECUNIA ADVISORY ID: SA51867 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51867/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51867 RELEASE DATE: 2013-01-25 DISCUSS ADVISORY: http://secunia.com/advisories/51867/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51867/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51867 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: SEC Consult has reported a vulnerability in F5 Products, which can be exploited by malicious users to conduct SQL injection attacks. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerability is reported in the following products: * BIG-IP LTM version 11.x * BIG-IP GTM version 11.x * BIG-IP ASM version 11.x * BIG-IP Link Controller version 11.x * BIG-IP PSM version 11.x * BIG-IP APM version 11.x * BIG-IP Edge Gateway version 11.x * BIG-IP Analytics version 11.x SOLUTION: Update to a fixed version (Please see vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Stefan Viehb\xf6ck, SEC Consult. ORIGINAL ADVISORY: sol14154: http://support.f5.com/kb/en-us/solutions/public/14000/100/sol14154.html SEC Consult: https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130122-1_F5_BIG-IP_SQL_Injection_v10.txt OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2012-3000 // JVNDB: JVNDB-2012-006127 // CNVD: CNVD-2013-00509 // BID: 57500 // VULHUB: VHN-56281 // PACKETSTORM: 119826

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-00509

AFFECTED PRODUCTS

vendor:f5model:big-ip access policy managerscope:eqversion:11.0.0 to 11.2.1 (apm webgui)

Trust: 1.6

vendor:f5model:big-ip edge gatewayscope:eqversion:11.2.0

Trust: 1.6

vendor:f5model:big-ip access policy managerscope:eqversion:11.0.0

Trust: 1.6

vendor:f5model:big-ip access policy managerscope:eqversion:11.1.0

Trust: 1.6

vendor:f5model:big-ip edge gatewayscope:eqversion:11.0.0

Trust: 1.6

vendor:f5model:big-ip edge gatewayscope:eqversion:11.2.1

Trust: 1.6

vendor:f5model:big-ip edge gatewayscope:eqversion:11.1.0

Trust: 1.6

vendor:f5model:big-ip access policy managerscope:eqversion:11.2.0

Trust: 1.6

vendor:f5model:big-ip access policy managerscope:eqversion:11.2.1

Trust: 1.6

vendor:f5model:big-ip link controllerscope:eqversion:11.2.1

Trust: 1.3

vendor:f5model:big-ip analyticsscope:eqversion:11.2.1

Trust: 1.3

vendor:f5model:big-ip analyticsscope:eqversion:11.1.0

Trust: 1.3

vendor:f5model:big-ip analyticsscope:eqversion:11.0.0

Trust: 1.3

vendor:f5model:big-ip protocol security modulescope:eqversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:eqversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:11.2.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:11.2.0

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:eqversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:eqversion:11.2.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:eqversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:eqversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:11.2.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:eqversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:eqversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:11.2.1

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:eqversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:eqversion:11.2.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:eqversion:11.2.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:11.2.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:11.2.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:eqversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:11.0.0 to 11.2.1 (apm webgui)

Trust: 0.8

vendor:f5model:big-ip application security managerscope:eqversion:11.0.0 to 11.2.1 (apm webgui)

Trust: 0.8

vendor:f5model:big-ip edge gatewayscope:eqversion:11.0.0 to 11.2.1 (apm webgui)

Trust: 0.8

vendor:f5model:big-ip global traffic managerscope:eqversion:11.0.0 to 11.2.1 (apm webgui)

Trust: 0.8

vendor:f5model:big-ip link controllerscope:eqversion:11.0.0 to 11.2.1 (apm webgui)

Trust: 0.8

vendor:f5model:big-ip local traffic managerscope:eqversion:11.0.0 to 11.2.1 (apm webgui)

Trust: 0.8

vendor:f5model:big-ip protocol security modulescope:eqversion:11.0.0 to 11.2.1 (apm webgui)

Trust: 0.8

vendor:f5model:big-ip wan optimization managerscope:eqversion:11.0.0 to 11.2.1 (avr webgui)

Trust: 0.8

vendor:f5model:big-ip webacceleratorscope:eqversion:11.0.0 to 11.2.1 (avr webgui)

Trust: 0.8

vendor:f5model:big-ipscope:lteversion:<=11.2.0

Trust: 0.6

vendor:f5model:big-ip psmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.2.00

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.0.00

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.2.00

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.0.00

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip womscope:neversion:11.0

Trust: 0.3

vendor:f5model:big-ip womscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip womscope:neversion:10.0

Trust: 0.3

vendor:f5model:big-ip womscope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:neversion:9.4.80

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:neversion:11.3

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:neversion:11.0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip psmscope:neversion:11.3

Trust: 0.3

vendor:f5model:big-ip psmscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip psmscope:neversion:9.4.8

Trust: 0.3

vendor:f5model:big-ip psm hf3scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip psm hf3scope:neversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip ltm hf3scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltm hf3scope:neversion:11.2

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:9.4.8

Trust: 0.3

vendor:f5model:big-ip ltmscope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:neversion:9.4.80

Trust: 0.3

vendor:f5model:big-ip link controllerscope:neversion:11.3

Trust: 0.3

vendor:f5model:big-ip link controller hf3scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controller hf3scope:neversion:11.2

Trust: 0.3

vendor:f5model:big-ip link controllerscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip gtmscope:neversion:11.3

Trust: 0.3

vendor:f5model:big-ip gtm hf3scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip gtmscope:neversion:9.4.8

Trust: 0.3

vendor:f5model:big-ip gtm hf3scope:neversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:neversion:11.3

Trust: 0.3

vendor:f5model:big-ip edge gateway hf3scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip edge gateway hf3scope:neversion:11.2

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:9.4.80

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:neversion:11.2.00

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:10.2.40

Trust: 0.3

vendor:f5model:big-ip asmscope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip asm hf3scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip apmscope:neversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip apm hf3scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apm hf3scope:neversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:neversion:11.3

Trust: 0.3

vendor:f5model:big-ip analytics hf3scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analytics hf3scope:neversion:11.2

Trust: 0.3

vendor:f5model:big-ip hf3scope:neversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip hf3scope:neversion:11.2

Trust: 0.3

sources: CNVD: CNVD-2013-00509 // BID: 57500 // JVNDB: JVNDB-2012-006127 // CNNVD: CNNVD-201301-449 // NVD: CVE-2012-3000

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3000
value: HIGH

Trust: 1.0

NVD: CVE-2012-3000
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201301-449
value: HIGH

Trust: 0.6

VULHUB: VHN-56281
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-3000
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-56281
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-56281 // JVNDB: JVNDB-2012-006127 // CNNVD: CNNVD-201301-449 // NVD: CVE-2012-3000

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.9

sources: VULHUB: VHN-56281 // JVNDB: JVNDB-2012-006127 // NVD: CVE-2012-3000

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201301-449

TYPE

sql injection

Trust: 0.7

sources: PACKETSTORM: 119826 // CNNVD: CNNVD-201301-449

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-006127

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-56281

PATCH

title:SOL14154: SQL injection vulnerability from an authenticated source CVE-2012-3000url:http://support.f5.com/kb/en-us/solutions/public/14000/100/sol14154.html

Trust: 0.8

title:F5 BIG-IP 'saveSettings.php' patch for SQL injection vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/31171

Trust: 0.6

sources: CNVD: CNVD-2013-00509 // JVNDB: JVNDB-2012-006127

EXTERNAL IDS

db:NVDid:CVE-2012-3000

Trust: 3.4

db:BIDid:57500

Trust: 2.0

db:SECUNIAid:51867

Trust: 1.8

db:PACKETSTORMid:119739

Trust: 1.7

db:OSVDBid:89446

Trust: 1.7

db:JVNDBid:JVNDB-2012-006127

Trust: 0.8

db:CNNVDid:CNNVD-201301-449

Trust: 0.7

db:CNVDid:CNVD-2013-00509

Trust: 0.6

db:XFid:81457

Trust: 0.6

db:XFid:5

Trust: 0.6

db:BUGTRAQid:20130122 SEC CONSULT SA-20130122-1 :: F5 BIG-IP SQL INJECTION VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-56281

Trust: 0.1

db:PACKETSTORMid:119826

Trust: 0.1

sources: CNVD: CNVD-2013-00509 // VULHUB: VHN-56281 // BID: 57500 // JVNDB: JVNDB-2012-006127 // PACKETSTORM: 119826 // CNNVD: CNNVD-201301-449 // NVD: CVE-2012-3000

REFERENCES

url:https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130122-1_f5_big-ip_sql_injection_v10.txt

Trust: 2.9

url:http://support.f5.com/kb/en-us/solutions/public/14000/100/sol14154.html

Trust: 2.1

url:http://www.securityfocus.com/bid/57500

Trust: 1.7

url:http://archives.neohapsis.com/archives/bugtraq/2013-01/0094.html

Trust: 1.7

url:http://packetstormsecurity.com/files/119739/f5-big-ip-11.2.0-sql-injection.html

Trust: 1.7

url:http://osvdb.org/89446

Trust: 1.7

url:http://secunia.com/advisories/51867

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/81457

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3000

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3000

Trust: 0.8

url:https://www.sec-consult.com/en/vulnerability-lab/advisories.htm#a108https

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/81457

Trust: 0.6

url:http://www.f5.com/products/big-ip/

Trust: 0.3

url:http://secunia.com/advisories/51867/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/51867/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51867

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2013-00509 // VULHUB: VHN-56281 // BID: 57500 // JVNDB: JVNDB-2012-006127 // PACKETSTORM: 119826 // CNNVD: CNNVD-201301-449 // NVD: CVE-2012-3000

CREDITS

S. Viehb??ck of SEC Consult Vulnerability Lab

Trust: 0.6

sources: CNNVD: CNNVD-201301-449

SOURCES

db:CNVDid:CNVD-2013-00509
db:VULHUBid:VHN-56281
db:BIDid:57500
db:JVNDBid:JVNDB-2012-006127
db:PACKETSTORMid:119826
db:CNNVDid:CNNVD-201301-449
db:NVDid:CVE-2012-3000

LAST UPDATE DATE

2024-08-14T12:07:56.386000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-00509date:2013-01-24T00:00:00
db:VULHUBid:VHN-56281date:2017-08-29T00:00:00
db:BIDid:57500date:2015-03-19T08:21:00
db:JVNDBid:JVNDB-2012-006127date:2014-02-03T00:00:00
db:CNNVDid:CNNVD-201301-449date:2014-02-07T00:00:00
db:NVDid:CVE-2012-3000date:2017-08-29T01:31:47.587

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-00509date:2013-01-24T00:00:00
db:VULHUBid:VHN-56281date:2014-01-30T00:00:00
db:BIDid:57500date:2013-01-22T00:00:00
db:JVNDBid:JVNDB-2012-006127date:2014-02-03T00:00:00
db:PACKETSTORMid:119826date:2013-01-25T03:09:13
db:CNNVDid:CNNVD-201301-449date:2013-01-24T00:00:00
db:NVDid:CVE-2012-3000date:2014-01-30T15:06:21.767