ID

VAR-201409-0409


CVE

CVE-2014-3359


TITLE

Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-004405

DESCRIPTION

Memory leak in Cisco IOS 15.1 through 15.4 and IOS XE 3.4.xS, 3.5.xS, 3.6.xS, and 3.7.xS before 3.7.6S; 3.8.xS, 3.9.xS, and 3.10.xS before 3.10.1S; and 3.11.xS before 3.12S allows remote attackers to cause a denial of service (memory consumption or device reload) via malformed DHCPv6 packets, aka Bug ID CSCum90081. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. This issue is being tracked by Cisco Bug ID CSCum90081. The following products and versions are affected: Cisco IOS Releases 15.1 through 15.4, IOS XE 3.7.6S prior to 3.4.xS, 3.5.xS, 3.6.xS and 3.7.xS, 3.10.1S prior to 3.8.xS, 3.9 .xS version and 3.10.xS version, 3.11.xS version before 3.12S

Trust: 2.61

sources: NVD: CVE-2014-3359 // JVNDB: JVNDB-2014-004405 // CNVD: CNVD-2014-06438 // BID: 70140 // VULHUB: VHN-71299 // VULMON: CVE-2014-3359

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-06438

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.11.2s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7\(5\)s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.8s\(.2\)

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.8s\(.0\)

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.8s\(.1\)

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.11.1s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.8.0s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7\(4\)s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.10.0s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.11.0s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.4.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7\(0\)s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.5s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7\(1\)as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7\(3\)s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7\(2\)s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s\(.1\)

Trust: 1.0

vendor:ciscomodel:ios 15.3 s2scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.3 sscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.2 s2scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.2 s1scope: - version: -

Trust: 0.9

vendor:ciscomodel:iosscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xescope: - version: -

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.0-15.4

Trust: 0.6

vendor:ciscomodel:ios xe softwarescope:eqversion:3.x

Trust: 0.6

vendor:ciscomodel:ios 15.4 tscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.4 cgscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.3 s1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2 s0cscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2 sscope: - version: -

Trust: 0.6

vendor:rockwellmodel:automation stratixscope:eqversion:59000

Trust: 0.3

vendor:ciscomodel:ios xe software 3.9s.0.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.9s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.8s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.8s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.8s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.7s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.6s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.6s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.6s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.5s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.5s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.5s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.5escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4sg.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4sg.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4sg.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4s.6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4s.5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4s.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.4s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3xo.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3sg.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3sg.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3sg.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3se.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3se.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.3s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2se.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2se.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2se.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2se.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.2s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.1s.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.1s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.1s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.1s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe software 3.10s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.6.2

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.6.1

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.4.1

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.4

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.3.2

Trust: 0.3

vendor:ciscomodel:ios xe tscope:eqversion:2.3.1

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.2.3

Trust: 0.3

vendor:ciscomodel:ios xe 3.11s.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.11s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.6.0

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.5.0

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.3.0

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.2.2

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.1.2

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.1.0

Trust: 0.3

vendor:ciscomodel:ios xe 15.3 s2ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 15.3 s2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4cgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 s2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 s0escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 s0dscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 s0cscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 s0bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 s0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4 cg1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 m3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 ja75scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s1bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s0xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s1escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2sniscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2snhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2sngscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s4ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s3ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 snh1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 snhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 sngscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s0dscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1mrascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 s6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 s5ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 s4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 s3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 s2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 s0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 mra2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 mra1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 mrascope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation stratixscope:neversion:590015.6.3

Trust: 0.3

sources: CNVD: CNVD-2014-06438 // BID: 70140 // JVNDB: JVNDB-2014-004405 // CNNVD: CNNVD-201409-962 // NVD: CVE-2014-3359

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3359
value: HIGH

Trust: 1.0

NVD: CVE-2014-3359
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-06438
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201409-962
value: HIGH

Trust: 0.6

VULHUB: VHN-71299
value: HIGH

Trust: 0.1

VULMON: CVE-2014-3359
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-3359
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2014-06438
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-71299
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-06438 // VULHUB: VHN-71299 // VULMON: CVE-2014-3359 // JVNDB: JVNDB-2014-004405 // CNNVD: CNNVD-201409-962 // NVD: CVE-2014-3359

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-71299 // JVNDB: JVNDB-2014-004405 // NVD: CVE-2014-3359

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201409-962

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201409-962

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-004405

PATCH

title:cisco-sa-20140924-dhcpv6url:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-dhcpv6

Trust: 0.8

title:35609url:http://tools.cisco.com/security/center/viewAlert.x?alertId=35609

Trust: 0.8

title:Cisco IOS and IOS XE Software DHCPv6 Denial of Service Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/50432

Trust: 0.6

title:Cisco: Cisco IOS Software DHCP Version 6 Denial of Service Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20140924-dhcpv6

Trust: 0.1

sources: CNVD: CNVD-2014-06438 // VULMON: CVE-2014-3359 // JVNDB: JVNDB-2014-004405

EXTERNAL IDS

db:NVDid:CVE-2014-3359

Trust: 3.5

db:BIDid:70140

Trust: 2.1

db:SECTRACKid:1030895

Trust: 1.2

db:JVNDBid:JVNDB-2014-004405

Trust: 0.8

db:CNNVDid:CNNVD-201409-962

Trust: 0.7

db:CNVDid:CNVD-2014-06438

Trust: 0.6

db:ICS CERTid:ICSA-17-094-04

Trust: 0.4

db:VULHUBid:VHN-71299

Trust: 0.1

db:VULMONid:CVE-2014-3359

Trust: 0.1

sources: CNVD: CNVD-2014-06438 // VULHUB: VHN-71299 // VULMON: CVE-2014-3359 // BID: 70140 // JVNDB: JVNDB-2014-004405 // CNNVD: CNNVD-201409-962 // NVD: CVE-2014-3359

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140924-dhcpv6

Trust: 2.2

url:http://www.securityfocus.com/bid/70140

Trust: 1.9

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140924-dhcpv6/cvrf/cisco-sa-20140924-dhcpv6_cvrf.xml

Trust: 1.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3359

Trust: 1.4

url:http://www.securitytracker.com/id/1030895

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/96177

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3359

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-17-094-04

Trust: 0.4

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=35609

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2014-06438 // VULHUB: VHN-71299 // VULMON: CVE-2014-3359 // BID: 70140 // JVNDB: JVNDB-2014-004405 // CNNVD: CNNVD-201409-962 // NVD: CVE-2014-3359

CREDITS

Cisco

Trust: 0.3

sources: BID: 70140

SOURCES

db:CNVDid:CNVD-2014-06438
db:VULHUBid:VHN-71299
db:VULMONid:CVE-2014-3359
db:BIDid:70140
db:JVNDBid:JVNDB-2014-004405
db:CNNVDid:CNNVD-201409-962
db:NVDid:CVE-2014-3359

LAST UPDATE DATE

2024-11-23T20:16:11.218000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-06438date:2014-09-28T00:00:00
db:VULHUBid:VHN-71299date:2017-08-29T00:00:00
db:VULMONid:CVE-2014-3359date:2017-08-29T00:00:00
db:BIDid:70140date:2017-05-23T16:25:00
db:JVNDBid:JVNDB-2014-004405date:2014-09-26T00:00:00
db:CNNVDid:CNNVD-201409-962date:2014-09-26T00:00:00
db:NVDid:CVE-2014-3359date:2024-11-21T02:07:56.260

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-06438date:2014-09-28T00:00:00
db:VULHUBid:VHN-71299date:2014-09-25T00:00:00
db:VULMONid:CVE-2014-3359date:2014-09-25T00:00:00
db:BIDid:70140date:2014-09-24T00:00:00
db:JVNDBid:JVNDB-2014-004405date:2014-09-26T00:00:00
db:CNNVDid:CNNVD-201409-962date:2014-09-26T00:00:00
db:NVDid:CVE-2014-3359date:2014-09-25T10:55:08.637