Search criteria

6 vulnerabilities found for SEIL/x86 by Internet Initiative Japan Inc.

CVE-2017-10856 (GCVE-0-2017-10856)

Vulnerability from cvelistv5 – Published: 2017-09-15 17:00 – Updated: 2024-08-05 17:50
VLAI?
Summary
SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device's encrypted communications via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
  • Denial-of-service (DoS)
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:50:12.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#76692689",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01811.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEIL/X",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.60 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/B1",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.60 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/x86",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "3.20 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/BPV4",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.00 to 5.72"
            }
          ]
        }
      ],
      "datePublic": "2017-09-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial-of-service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-15T16:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#76692689",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.seil.jp/support/security/a01811.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-10856",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEIL/X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.60 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/B1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.60 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/x86",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "3.20 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/BPV4",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.00 to 5.72"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Internet Initiative Japan Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial-of-service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#76692689",
              "refsource": "JVN",
              "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01811.html",
              "refsource": "MISC",
              "url": "http://www.seil.jp/support/security/a01811.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-10856",
    "datePublished": "2017-09-15T17:00:00",
    "dateReserved": "2017-07-04T00:00:00",
    "dateUpdated": "2024-08-05T17:50:12.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-10856 (GCVE-0-2017-10856)

Vulnerability from nvd – Published: 2017-09-15 17:00 – Updated: 2024-08-05 17:50
VLAI?
Summary
SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device's encrypted communications via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
  • Denial-of-service (DoS)
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:50:12.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#76692689",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01811.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEIL/X",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.60 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/B1",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.60 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/x86",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "3.20 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/BPV4",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.00 to 5.72"
            }
          ]
        }
      ],
      "datePublic": "2017-09-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial-of-service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-15T16:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#76692689",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.seil.jp/support/security/a01811.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-10856",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEIL/X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.60 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/B1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.60 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/x86",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "3.20 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/BPV4",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.00 to 5.72"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Internet Initiative Japan Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial-of-service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#76692689",
              "refsource": "JVN",
              "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01811.html",
              "refsource": "MISC",
              "url": "http://www.seil.jp/support/security/a01811.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-10856",
    "datePublished": "2017-09-15T17:00:00",
    "dateReserved": "2017-07-04T00:00:00",
    "dateUpdated": "2024-08-05T17:50:12.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

JVNDB-2017-000222

Vulnerability from jvndb - Published: 2017-09-11 15:19 - Updated:2018-02-28 14:12
Severity ?
Summary
SEIL Series routers vulnerable to denial-of-service (DoS)
Details
The IPsec/IKE function in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing certain packets. Internet Initiative Japan Inc. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Internet Initiative Japan Inc. coordinated under the Information Security Early Warning Partnership.
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000222.html",
  "dc:date": "2018-02-28T14:12+09:00",
  "dcterms:issued": "2017-09-11T15:19+09:00",
  "dcterms:modified": "2018-02-28T14:12+09:00",
  "description": "The IPsec/IKE function in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing certain packets.\r\n\r\nInternet Initiative Japan Inc. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Internet Initiative Japan Inc. coordinated under the Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000222.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fbpv4",
      "@product": "SEIL/BPV4",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx",
      "@product": "SEIL/X",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx86",
      "@product": "SEIL/x86",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": [
    {
      "@score": "5.0",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "@version": "2.0"
    },
    {
      "@score": "5.3",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2017-000222",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN76692689/index.html",
      "@id": "JVN#76692689",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10856",
      "@id": "CVE-2017-10856",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2017-10856",
      "@id": "CVE-2017-10856",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-noinfo",
      "@title": "No Mapping(CWE-noinfo)"
    }
  ],
  "title": "SEIL Series routers vulnerable to denial-of-service (DoS)"
}

JVNDB-2014-000055

Vulnerability from jvndb - Published: 2014-06-13 12:44 - Updated:2014-06-17 16:11

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000055.html",
  "dc:date": "2014-06-17T16:11+09:00",
  "dcterms:issued": "2014-06-13T12:44+09:00",
  "dcterms:modified": "2014-06-17T16:11+09:00",
  "description": "The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets. (CWE-119)",
  "link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000055.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fneu_2fe_plus",
      "@product": "SEIL/neu 2FE Plus",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fturbo",
      "@product": "SEIL/Turbo",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx86",
      "@product": "SEIL/x86",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fb1_firmware",
      "@product": "SEIL/B1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
      "@product": "SEIL/neu 2FE Plus firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fturbo_firmware",
      "@product": "SEIL/Turbo firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx1_firmware",
      "@product": "SEIL/X1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx2_firmware",
      "@product": "SEIL/X2 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx86_firmware",
      "@product": "SEIL/x86 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "5.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2014-000055",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN10724763/index.html",
      "@id": "JVN#10724763",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2004",
      "@id": "CVE-2014-2004",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2004",
      "@id": "CVE-2014-2004",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    }
  ],
  "title": "SEIL Series routers vulnerable to denial-of-service (DoS)"
}

JVNDB-2013-000092

Vulnerability from jvndb - Published: 2013-09-20 14:57 - Updated:2013-09-30 16:46

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000092.html",
  "dc:date": "2013-09-30T16:46+09:00",
  "dcterms:issued": "2013-09-20T14:57+09:00",
  "dcterms:modified": "2013-09-30T16:46+09:00",
  "description": "SEIL Series routers contain a buffer overflow vulnerability.\r\n\r\nThe PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains a buffer overflow vulnerability in processing L2TP messages.",
  "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000092.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fneu_2fe_plus",
      "@product": "SEIL/neu 2FE Plus",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fturbo",
      "@product": "SEIL/Turbo",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx86",
      "@product": "SEIL/x86",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fb1_firmware",
      "@product": "SEIL/B1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
      "@product": "SEIL/neu 2FE Plus firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fturbo_firmware",
      "@product": "SEIL/Turbo firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx1_firmware",
      "@product": "SEIL/X1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx2_firmware",
      "@product": "SEIL/X2 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx86_firmware",
      "@product": "SEIL/x86 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "7.5",
    "@severity": "High",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2013-000092",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN43152129/",
      "@id": "JVN#43152129",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4709",
      "@id": "CVE-2013-4709",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=http://support.apple.com/kb/CVE-2013-4709",
      "@id": "CVE-2013-4709",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    }
  ],
  "title": "SEIL Series routers vulnerable to buffer overflow"
}

JVNDB-2013-000091

Vulnerability from jvndb - Published: 2013-09-20 14:52 - Updated:2013-10-08 15:36

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000091.html",
  "dc:date": "2013-10-08T15:36+09:00",
  "dcterms:issued": "2013-09-20T14:52+09:00",
  "dcterms:modified": "2013-10-08T15:36+09:00",
  "description": "SEIL Series routers contain a vulnerability in RADIUS authentication.\r\n\r\nThe PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains an issue when generating random numbers used for RADIUS authentication, which may result in the generated random numbers to be easily predicted.",
  "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000091.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fneu_2fe_plus",
      "@product": "SEIL/neu 2FE Plus",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fturbo",
      "@product": "SEIL/Turbo",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx86",
      "@product": "SEIL/x86",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fb1_firmware",
      "@product": "SEIL/B1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
      "@product": "SEIL/neu 2FE Plus firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fturbo_firmware",
      "@product": "SEIL/Turbo firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx1_firmware",
      "@product": "SEIL/X1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx2_firmware",
      "@product": "SEIL/X2 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx86_firmware",
      "@product": "SEIL/x86 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "4.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2013-000091",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN40079308/",
      "@id": "JVN#40079308",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4708",
      "@id": "CVE-2013-4708",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4708",
      "@id": "CVE-2013-4708",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "SEIL Series routers vulnerable in RADIUS authentication"
}