Search criteria
6 vulnerabilities found for seil_b1_firmware by iij
FKIE_CVE-2014-7256
Vulnerability from fkie_nvd - Published: 2014-12-05 17:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.82:*:*:*:*:*:*:*",
"matchCriteriaId": "A8AF81A7-837E-4761-ADAF-1756F56E6263",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.83:*:*:*:*:*:*:*",
"matchCriteriaId": "04A44243-F621-4DDB-9621-D564B32D436E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.84:*:*:*:*:*:*:*",
"matchCriteriaId": "1C9F3288-BB87-4673-BD2E-25B48A04CE8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.85:*:*:*:*:*:*:*",
"matchCriteriaId": "935EAFE9-A8FF-41E8-AE64-0E7FC4F271B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.86:*:*:*:*:*:*:*",
"matchCriteriaId": "10CC1B2F-A6C1-4B8D-9E27-2D5A98682DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.87:*:*:*:*:*:*:*",
"matchCriteriaId": "B5898040-ADC5-458B-B193-4A52C77CBC7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.88:*:*:*:*:*:*:*",
"matchCriteriaId": "9E19D2EE-84F2-4FAC-A6A6-24D63D819F5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.89:*:*:*:*:*:*:*",
"matchCriteriaId": "0E5BD396-126A-40EE-AC81-A0F687C3762A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "42BC9943-7C7B-456C-BBF4-0A87E030836C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "8ABFBB33-987E-4FE5-A106-0C32247974EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "2A724AF0-86A8-428A-BD5E-C0BD1CA08072",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.93:*:*:*:*:*:*:*",
"matchCriteriaId": "8A12AC3D-D2CE-41BF-8F27-B6936484BD8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.94:*:*:*:*:*:*:*",
"matchCriteriaId": "3BEA1CB3-543A-42B7-9CA6-D470B0342137",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.95:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B05CB0-38B6-4F40-A90A-C81FE7ADA9E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.96:*:*:*:*:*:*:*",
"matchCriteriaId": "EB67B970-6546-45DD-B8FC-1F1F27BB050F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.97:*:*:*:*:*:*:*",
"matchCriteriaId": "FB8DB634-413D-41DD-B596-5730542B49B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.98:*:*:*:*:*:*:*",
"matchCriteriaId": "33E44179-D3E6-4106-96E3-122B3A4806C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.99:*:*:*:*:*:*:*",
"matchCriteriaId": "5483C73C-3345-4492-9AB5-BC6489BAF9B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "F17EC984-B88B-4D3E-B956-78CB3041BB40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "EBA99711-7FF7-4EA9-8E8B-20477FE8CBE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "839CD215-C503-436A-A824-DAB168A0E2EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.04:*:*:*:*:*:*:*",
"matchCriteriaId": "F6FFA2B0-529C-4D02-96E6-6A70A0A68C32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "0D8F5B49-A097-4912-8C44-1538A487A73F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.06:*:*:*:*:*:*:*",
"matchCriteriaId": "0DD7EA50-ED35-41C5-8BA2-73F479FF45B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.07:*:*:*:*:*:*:*",
"matchCriteriaId": "1C62D9B6-F9C8-467D-9B40-3BF702080253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.08:*:*:*:*:*:*:*",
"matchCriteriaId": "9AF27EB9-E61D-4720-BC3B-8273DB5750D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.09:*:*:*:*:*:*:*",
"matchCriteriaId": "53D3AF7E-852A-4D63-8804-55B800156463",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6AEC9267-68F1-4F06-AC94-B258A7EADF57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FA5828AF-1771-446F-B1C9-C9E784374E42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DF1912-2D0A-4AF8-9FB8-F4D68E61B1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "285986CA-EF04-4BAB-85F7-26E6B9E3F5C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "99D619EB-2CAF-4D82-A85C-E6DC34C2503B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5E368622-0061-4774-B840-8EF019118259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "90A042D8-749D-4D60-A6E9-6055CFD96301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "1C27E5D8-F686-4FBF-89C6-63F8C9ABDCDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEF318E-0942-473E-9B59-E3E2EA38A881",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil_plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DF4D75F-1C14-43F6-9EAA-378259A4F619",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil_b1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "06F00C33-488B-4B95-AE61-8DFBB7BC87EE",
"versionEndIncluding": "4.61",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil_b1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "940A003E-562A-4CA9-9BED-0BE0D5D920AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil_x1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E1C7880-0B1A-473C-9A6C-038BD56AA188",
"versionEndIncluding": "4.61",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil_x1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D0488C-1B4D-439F-BF9F-32582FE940CE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.82:*:*:*:*:*:*:*",
"matchCriteriaId": "6A4ED3E9-E9E9-4D8E-959B-8C12C887340B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.83:*:*:*:*:*:*:*",
"matchCriteriaId": "3EEE850C-CF9D-4508-9900-48F2F57D0A17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.84:*:*:*:*:*:*:*",
"matchCriteriaId": "36FDE24C-07C4-459F-A581-4EC759398227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.85:*:*:*:*:*:*:*",
"matchCriteriaId": "297D6A60-813A-4CC3-BBE3-3C6F8FA404E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.86:*:*:*:*:*:*:*",
"matchCriteriaId": "5D5C43E9-817C-4AB9-8799-DD155A038CC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.87:*:*:*:*:*:*:*",
"matchCriteriaId": "FEB8FF74-0E02-4E23-A19E-4BB976947704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.88:*:*:*:*:*:*:*",
"matchCriteriaId": "0CB4919C-FC12-4988-A4CE-C6726C7207EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.89:*:*:*:*:*:*:*",
"matchCriteriaId": "A3CF9E9B-5520-438C-92C8-A7D695324963",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "A84D2EA5-61D9-4A30-929B-7EBE636ED7E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "12756F24-A3FD-44FB-B84C-B42B496A6A6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "BE4B9526-F557-423C-B999-562C01EAB95A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.93:*:*:*:*:*:*:*",
"matchCriteriaId": "BA4687A4-1B12-4E41-BEB1-8A80A97DB593",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.94:*:*:*:*:*:*:*",
"matchCriteriaId": "791B43C4-EC52-496C-BA7B-2D8228ED59B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.95:*:*:*:*:*:*:*",
"matchCriteriaId": "13249B53-826E-4790-87B0-076416B71790",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.96:*:*:*:*:*:*:*",
"matchCriteriaId": "6C79D356-1006-4FFC-AFFD-207043BA56BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.97:*:*:*:*:*:*:*",
"matchCriteriaId": "C15676AA-BCD2-457C-AEA5-876397B45645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.98:*:*:*:*:*:*:*",
"matchCriteriaId": "8F844D0E-8658-4B61-B40F-0E9CCD143CB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.99:*:*:*:*:*:*:*",
"matchCriteriaId": "DAB20ADD-7475-4D81-A267-0FD91B19DF68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.00:*:*:*:*:*:*:*",
"matchCriteriaId": "D212AD73-011B-426B-A625-0842C11E737D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "21362248-D616-4E45-B7AA-2865CCEB507D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "03625630-67AB-40F4-BDF2-CCEC929DD365",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "D5BF6BB7-4B1B-4627-B8B4-E089FD16BCEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.04:*:*:*:*:*:*:*",
"matchCriteriaId": "FC8A93F7-53F1-4F45-83D7-34E7C8018D6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "C6E746B5-456F-41DC-924A-08A33A7F589E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.06:*:*:*:*:*:*:*",
"matchCriteriaId": "29099FC4-3300-464C-A833-32E59443FFBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.07:*:*:*:*:*:*:*",
"matchCriteriaId": "63C8E019-2F2C-46F6-9D87-A79EC0D04237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.08:*:*:*:*:*:*:*",
"matchCriteriaId": "599BDA78-531C-42FB-B9BC-A515E40AB911",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.09:*:*:*:*:*:*:*",
"matchCriteriaId": "BAA31574-967E-4B0F-9924-FB0F785FD4BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FB4B8805-B369-475E-A04E-2413D3BDD854",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0D5A1FE6-AE75-42C6-83A0-1855312B460F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB947C1-D8E6-4AF4-A1C0-323E7FC13449",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F37FE5-E1E6-4F4A-8917-7CAB1FD2ADFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DB38BC1D-298B-4DF0-AF8E-154A77E9624A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5537DCAE-BFCD-4230-935B-0BFBDF6310B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "32053A0F-7732-41E8-AACB-3793A0B5736C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "062FDD27-9BC3-4086-B477-5890386B4403",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "78B5FC86-C877-42FB-8FDA-EC25EA3B064B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil_turbo:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EAFE445-793F-4226-90B4-E949E871E5DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02958119-053F-4D3E-AB1A-D6180F86FA98",
"versionEndIncluding": "3.21",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil_x86_fuji:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB961AA2-6D5C-4979-AE8A-80D6D2D48071",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil_x2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4138D3AD-2B60-4C1A-92ED-2A42DC1B4ADE",
"versionEndIncluding": "4.61",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil_x2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16B0262C-DF1A-4A8B-B4D2-CCB9D71EFBFE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets."
},
{
"lang": "es",
"value": "Los routers de la serie SEIL/x86 Fuji (1) PPP Access Concentrator (PPPAC) y (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL 1.00 hasta 3.22; SEIL/X1, SEIL/X2, y SEIL/B1 1.00 hasta 4.62; SEIL/Turbo 1.82 hasta 2.18; y SEIL/neu 2FE Plus 1.82 hasta 2.18 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio) a trav\u00e9s de paquetes (a) GRE o (b) MPPE manipulados."
}
],
"id": "CVE-2014-7256",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-12-05T17:59:05.197",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN04895240/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01511.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN04895240/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01511.html"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-7255
Vulnerability from fkie_nvd - Published: 2014-12-05 17:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Internet Initiative Japan Inc. SEIL Series routers SEIL/X1 2.50 through 4.62, SEIL/X2 2.50 through 4.62, SEIL/B1 2.50 through 4.62, and SEIL/x86 Fuji 1.70 through 3.22 allow remote attackers to cause a denial of service (CPU and traffic consumption) via a large number of NTP requests within a short time, which causes unnecessary NTP responses to be sent.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN21907573/index.html | Third Party Advisory | |
| vultures@jpcert.or.jp | http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000135.html | Third Party Advisory, VDB Entry | |
| vultures@jpcert.or.jp | http://www.seil.jp/support/security/a01510.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN21907573/index.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000135.html | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.seil.jp/support/security/a01510.html | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| iij | seil_b1_firmware | * | |
| iij | seil_b1 | - | |
| iij | seil_x2_firmware | * | |
| iij | seil_x2 | - | |
| iij | seil_x1_firmware | * | |
| iij | seil_x1 | - | |
| iij | seil_x86_fuji_firmware | * | |
| iij | seil_x86_fuji | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil_b1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33C82A0E-1814-42C6-BD5F-E226E9864874",
"versionEndIncluding": "4.62",
"versionStartIncluding": "2.50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil_b1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "940A003E-562A-4CA9-9BED-0BE0D5D920AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil_x2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A86E5AB-95E6-437F-B5A8-4B3902AE7555",
"versionEndIncluding": "4.62",
"versionStartIncluding": "2.50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil_x2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16B0262C-DF1A-4A8B-B4D2-CCB9D71EFBFE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil_x1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "300949E1-D258-429B-AE2B-0EDF582DB388",
"versionEndIncluding": "4.62",
"versionStartIncluding": "2.50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil_x1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D0488C-1B4D-439F-BF9F-32582FE940CE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51F8625D-5031-47A2-A606-AEA1F258465F",
"versionEndIncluding": "3.22",
"versionStartIncluding": "1.70",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil_x86_fuji:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB961AA2-6D5C-4979-AE8A-80D6D2D48071",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Internet Initiative Japan Inc. SEIL Series routers SEIL/X1 2.50 through 4.62, SEIL/X2 2.50 through 4.62, SEIL/B1 2.50 through 4.62, and SEIL/x86 Fuji 1.70 through 3.22 allow remote attackers to cause a denial of service (CPU and traffic consumption) via a large number of NTP requests within a short time, which causes unnecessary NTP responses to be sent."
},
{
"lang": "es",
"value": "Los routers de la serie Internet Initiative Japan Inc. SEIL SEIL/X1 2.50 hasta 4.62, SEIL/X2 2.50 hasta 4.62, SEIL/B1 2.50 hasta 4.62, y SEIL/x86 Fuji 1.70 hasta 3.22 permiten a atacantes remotos causar una denegaci\u00f3n de saervicio (consumo de CPU y trafico) a trav\u00e9s de un n\u00famero grande de solicitudes NTP dentro de un tiempo corto, lo que causa el env\u00edo de respuestas NTP innecesarias."
}
],
"id": "CVE-2014-7255",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2014-12-05T17:59:03.993",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/jp/JVN21907573/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000135.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01510.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/jp/JVN21907573/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000135.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01510.html"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2014-7255 (GCVE-0-2014-7255)
Vulnerability from cvelistv5 – Published: 2014-12-05 17:00 – Updated: 2024-08-06 12:40
VLAI?
Summary
Internet Initiative Japan Inc. SEIL Series routers SEIL/X1 2.50 through 4.62, SEIL/X2 2.50 through 4.62, SEIL/B1 2.50 through 4.62, and SEIL/x86 Fuji 1.70 through 3.22 allow remote attackers to cause a denial of service (CPU and traffic consumption) via a large number of NTP requests within a short time, which causes unnecessary NTP responses to be sent.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T12:40:19.206Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2014-000135",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000135.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01510.html"
},
{
"name": "JVN#21907573",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN21907573/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-12-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Internet Initiative Japan Inc. SEIL Series routers SEIL/X1 2.50 through 4.62, SEIL/X2 2.50 through 4.62, SEIL/B1 2.50 through 4.62, and SEIL/x86 Fuji 1.70 through 3.22 allow remote attackers to cause a denial of service (CPU and traffic consumption) via a large number of NTP requests within a short time, which causes unnecessary NTP responses to be sent."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-12-05T16:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2014-000135",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000135.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01510.html"
},
{
"name": "JVN#21907573",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN21907573/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-7255",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Internet Initiative Japan Inc. SEIL Series routers SEIL/X1 2.50 through 4.62, SEIL/X2 2.50 through 4.62, SEIL/B1 2.50 through 4.62, and SEIL/x86 Fuji 1.70 through 3.22 allow remote attackers to cause a denial of service (CPU and traffic consumption) via a large number of NTP requests within a short time, which causes unnecessary NTP responses to be sent."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2014-000135",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000135.html"
},
{
"name": "http://www.seil.jp/support/security/a01510.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01510.html"
},
{
"name": "JVN#21907573",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN21907573/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-7255",
"datePublished": "2014-12-05T17:00:00",
"dateReserved": "2014-09-30T00:00:00",
"dateUpdated": "2024-08-06T12:40:19.206Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-7256 (GCVE-0-2014-7256)
Vulnerability from cvelistv5 – Published: 2014-12-05 17:00 – Updated: 2024-08-06 12:40
VLAI?
Summary
The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T12:40:19.266Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01511.html"
},
{
"name": "JVNDB-2014-000136",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html"
},
{
"name": "JVN#04895240",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN04895240/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-12-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-12-05T16:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01511.html"
},
{
"name": "JVNDB-2014-000136",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html"
},
{
"name": "JVN#04895240",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN04895240/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-7256",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.seil.jp/support/security/a01511.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01511.html"
},
{
"name": "JVNDB-2014-000136",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html"
},
{
"name": "JVN#04895240",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN04895240/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-7256",
"datePublished": "2014-12-05T17:00:00",
"dateReserved": "2014-09-30T00:00:00",
"dateUpdated": "2024-08-06T12:40:19.266Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-7255 (GCVE-0-2014-7255)
Vulnerability from nvd – Published: 2014-12-05 17:00 – Updated: 2024-08-06 12:40
VLAI?
Summary
Internet Initiative Japan Inc. SEIL Series routers SEIL/X1 2.50 through 4.62, SEIL/X2 2.50 through 4.62, SEIL/B1 2.50 through 4.62, and SEIL/x86 Fuji 1.70 through 3.22 allow remote attackers to cause a denial of service (CPU and traffic consumption) via a large number of NTP requests within a short time, which causes unnecessary NTP responses to be sent.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T12:40:19.206Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2014-000135",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000135.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01510.html"
},
{
"name": "JVN#21907573",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN21907573/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-12-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Internet Initiative Japan Inc. SEIL Series routers SEIL/X1 2.50 through 4.62, SEIL/X2 2.50 through 4.62, SEIL/B1 2.50 through 4.62, and SEIL/x86 Fuji 1.70 through 3.22 allow remote attackers to cause a denial of service (CPU and traffic consumption) via a large number of NTP requests within a short time, which causes unnecessary NTP responses to be sent."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-12-05T16:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2014-000135",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000135.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01510.html"
},
{
"name": "JVN#21907573",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN21907573/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-7255",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Internet Initiative Japan Inc. SEIL Series routers SEIL/X1 2.50 through 4.62, SEIL/X2 2.50 through 4.62, SEIL/B1 2.50 through 4.62, and SEIL/x86 Fuji 1.70 through 3.22 allow remote attackers to cause a denial of service (CPU and traffic consumption) via a large number of NTP requests within a short time, which causes unnecessary NTP responses to be sent."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2014-000135",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000135.html"
},
{
"name": "http://www.seil.jp/support/security/a01510.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01510.html"
},
{
"name": "JVN#21907573",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN21907573/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-7255",
"datePublished": "2014-12-05T17:00:00",
"dateReserved": "2014-09-30T00:00:00",
"dateUpdated": "2024-08-06T12:40:19.206Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-7256 (GCVE-0-2014-7256)
Vulnerability from nvd – Published: 2014-12-05 17:00 – Updated: 2024-08-06 12:40
VLAI?
Summary
The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T12:40:19.266Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01511.html"
},
{
"name": "JVNDB-2014-000136",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html"
},
{
"name": "JVN#04895240",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN04895240/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-12-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-12-05T16:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01511.html"
},
{
"name": "JVNDB-2014-000136",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html"
},
{
"name": "JVN#04895240",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN04895240/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-7256",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.seil.jp/support/security/a01511.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01511.html"
},
{
"name": "JVNDB-2014-000136",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html"
},
{
"name": "JVN#04895240",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN04895240/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-7256",
"datePublished": "2014-12-05T17:00:00",
"dateReserved": "2014-09-30T00:00:00",
"dateUpdated": "2024-08-06T12:40:19.266Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}