ID

VAR-201703-0902


CVE

CVE-2017-3849


TITLE

Cisco IOS and Cisco IOS XE of Autonomic Networking Infrastructure Vulnerability related to input validation in registrar function

Trust: 0.8

sources: JVNDB: JVNDB-2017-002734

DESCRIPTION

A vulnerability in the Autonomic Networking Infrastructure (ANI) registrar feature of Cisco IOS Software (possibly 15.2 through 15.6) and Cisco IOS XE Software (possibly 3.7 through 3.18, and 16) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted autonomic network channel discovery packet to a device that has all the following characteristics: (1) running a Cisco IOS Software or Cisco IOS XE Software release that supports the ANI feature; (2) configured as an autonomic registrar; (3) has a whitelist configured. An exploit could allow the attacker to cause the affected device to reload. Note: Autonomic networking should be configured with a whitelist. Do not remove the whitelist as a workaround. Cisco Bug IDs: CSCvc42717. Vendors have confirmed this vulnerability Bug ID CSCvc42717 It is released as.Service operation interruption (DoS) An attack may be carried out. Both Cisco IOS and IOSXESoftware are operating systems developed by Cisco Systems for their network devices. A remote attacker can exploit a vulnerability to send a specially crafted message for a denial of service attack

Trust: 2.52

sources: NVD: CVE-2017-3849 // JVNDB: JVNDB-2017-002734 // CNVD: CNVD-2017-03848 // BID: 96972 // VULHUB: VHN-112052

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-03848

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.16.2s

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.6\(1\)s3

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.9.0e

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.6\(1\)s2

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)s0a

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.18.1asp

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.6\(2\)s2

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.15.3s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.13.0s

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)s2

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.6\(2\)t1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.4as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(1\)s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15.4s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(3\)m1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.8as

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(2\)sp1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s9

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.18.0sp

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.0as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.4e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)s3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(5a\)e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)s4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14.4s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(3\)e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.5s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.18.1csp

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(2\)sp

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.3as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.3e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(3\)m0a

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(1\)s2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.18.0s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)s5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.5s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.1xbs

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)s1a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8.2e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(1\)s1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.3s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)s1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.0e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(4\)e3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.18.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.5as

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(3\)e2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(3\)m

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(1\)t2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.18.0as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.2e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.6s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(2\)s1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8.0e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9.1e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15.1s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(1\)s3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.17.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.17.1as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.5e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)s3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(1\)t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(3\)e3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)s2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.18.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.18.1bsp

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(3\)e1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.1s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)s4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.7s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(2\)s1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.17.3s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(2\)sn

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.2bs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14.1s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)sn

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s6

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.1as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.18.1sp

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s8

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(1\)s4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.6s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.0cs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.4bs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.2ts

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.18.3vs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.4s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(4\)e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(5\)e1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.17.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.1e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.2as

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.8s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)s2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.4s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(5b\)e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.1s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(2\)t2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)s6a

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)s4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.5s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(1\)s1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(2\)s2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(1\)s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(2\)s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s5

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)s1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)s4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(1\)t1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14.0s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(2\)t

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)s1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.4ds

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8.1e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)s1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15.1cs

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)s5

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(2\)s4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(4\)e1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(2\)s3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.6as

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(2\)s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.3s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(2\)s3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(5\)e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.0as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8.3e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)s6

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)s2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(4\)e2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.4\(3\)s3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.17.0s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.6\(1\)t0a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.3s

Trust: 1.0

vendor:ciscomodel:iosscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xescope: - version: -

Trust: 0.8

vendor:ciscomodel:ios softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios softwarescope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2017-03848 // BID: 96972 // JVNDB: JVNDB-2017-002734 // CNNVD: CNNVD-201703-906 // NVD: CVE-2017-3849

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-3849
value: HIGH

Trust: 1.0

NVD: CVE-2017-3849
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-03848
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201703-906
value: MEDIUM

Trust: 0.6

VULHUB: VHN-112052
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-3849
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-03848
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-112052
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-3849
baseSeverity: HIGH
baseScore: 7.4
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 4.0
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-03848 // VULHUB: VHN-112052 // JVNDB: JVNDB-2017-002734 // CNNVD: CNNVD-201703-906 // NVD: CVE-2017-3849

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-112052 // JVNDB: JVNDB-2017-002734 // NVD: CVE-2017-3849

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201703-906

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201703-906

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-002734

PATCH

title:cisco-sa-20170320-aniurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170320-ani

Trust: 0.8

title:Cisco IOS and IOSXESoftwareANI Registration Feature Denial of Service Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/91480

Trust: 0.6

title:Cisco IOS and IOS XE Software Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=68657

Trust: 0.6

sources: CNVD: CNVD-2017-03848 // JVNDB: JVNDB-2017-002734 // CNNVD: CNNVD-201703-906

EXTERNAL IDS

db:NVDid:CVE-2017-3849

Trust: 3.4

db:BIDid:96972

Trust: 2.6

db:SECTRACKid:1038064

Trust: 1.1

db:JVNDBid:JVNDB-2017-002734

Trust: 0.8

db:CNNVDid:CNNVD-201703-906

Trust: 0.7

db:CNVDid:CNVD-2017-03848

Trust: 0.6

db:NSFOCUSid:36193

Trust: 0.6

db:VULHUBid:VHN-112052

Trust: 0.1

sources: CNVD: CNVD-2017-03848 // VULHUB: VHN-112052 // BID: 96972 // JVNDB: JVNDB-2017-002734 // CNNVD: CNNVD-201703-906 // NVD: CVE-2017-3849

REFERENCES

url:http://www.securityfocus.com/bid/96972

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170320-ani

Trust: 2.0

url:http://www.securitytracker.com/id/1038064

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-3849

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-3849

Trust: 0.8

url:http://www.nsfocus.net/vulndb/36193

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

sources: CNVD: CNVD-2017-03848 // VULHUB: VHN-112052 // BID: 96972 // JVNDB: JVNDB-2017-002734 // CNNVD: CNNVD-201703-906 // NVD: CVE-2017-3849

CREDITS

Omar Eissa of ERNW.

Trust: 0.9

sources: BID: 96972 // CNNVD: CNNVD-201703-906

SOURCES

db:CNVDid:CNVD-2017-03848
db:VULHUBid:VHN-112052
db:BIDid:96972
db:JVNDBid:JVNDB-2017-002734
db:CNNVDid:CNNVD-201703-906
db:NVDid:CVE-2017-3849

LAST UPDATE DATE

2024-11-23T22:45:45.884000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-03848date:2017-04-03T00:00:00
db:VULHUBid:VHN-112052date:2017-07-12T00:00:00
db:BIDid:96972date:2017-03-23T00:01:00
db:JVNDBid:JVNDB-2017-002734date:2017-04-26T00:00:00
db:CNNVDid:CNNVD-201703-906date:2017-03-22T00:00:00
db:NVDid:CVE-2017-3849date:2024-11-21T03:26:14.290

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-03848date:2017-04-05T00:00:00
db:VULHUBid:VHN-112052date:2017-03-21T00:00:00
db:BIDid:96972date:2017-03-20T00:00:00
db:JVNDBid:JVNDB-2017-002734date:2017-04-26T00:00:00
db:CNNVDid:CNNVD-201703-906date:2017-03-21T00:00:00
db:NVDid:CVE-2017-3849date:2017-03-21T16:59:00.227