Search criteria
1 vulnerability found for wndap330 by netgear
VAR-200911-0002
Vulnerability from variot - Updated: 2023-12-18 13:35The Atheros wireless driver, as used in Netgear WNDAP330 Wi-Fi access point with firmware 2.1.11 and other versions before 3.0.3 on the Atheros AR9160-BC1A chipset, and other products, allows remote authenticated users to cause a denial of service (device reboot or hang) and possibly execute arbitrary code via a truncated reserved management frame. NETGEAR WNDAP330 is prone to a denial-of-service vulnerability because it fails to properly parse malformed reserved management frames. Successful exploits will cause the affected device to crash or reboot, denying service to legitimate users. WNDAP330 with firmware 2.1.11 is vulnerable.
Assigned CVE:
- CVE-2009-0052
Details:
- The bug can be triggered by a malicious reserved management frame sent to the wireless access point (truncated packet). This can be achieved only after a successful 802.11 authentication (in "Open" mode according to the configuration of the wireless access point) and a successful 802.11 association with appropriate security parameters (e.g. WPA w/ TKIP unicast, TKIP multicast) which depends on the configuration of the wireless access point. Any other wireless device relying on this vulnerable wireless driver is likely to be vulnerable.
Credits:
- This vulnerability was discovered by Laurent Butti from France Telecom / Orange . ----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability intelligence source on the market.
Implement it through Secunia.
For more information visit: http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com
TITLE: Netgear WNDAP330 Management Frame Denial of Service
SECUNIA ADVISORY ID: SA37344
VERIFY ADVISORY: http://secunia.com/advisories/37344/
DESCRIPTION: A vulnerability has been reported in Netgear WNDAP330, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an unspecified error in the parsing of management frames, which can be exploited to reboot or hang an affected device.
The vulnerability is reported in firmware version 2.1.11. Other versions may also be affected.
SOLUTION: Update to version 3.0.3. http://kb.netgear.com/app/answers/detail/a_id/12199
PROVIDED AND/OR DISCOVERED BY: Laurent Butti from France Telecom / Orange
ORIGINAL ADVISORY: http://archives.neohapsis.com/archives/bugtraq/current/0070.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200911-0002",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wndap330",
"scope": "eq",
"trust": 2.0,
"vendor": "netgear",
"version": "2.1.11"
},
{
"model": "ar9160-bc1a chipset",
"scope": "eq",
"trust": 1.1,
"vendor": "atheros",
"version": "*"
},
{
"model": "ar9160-bc1a chipset",
"scope": null,
"trust": 0.8,
"vendor": "atheros",
"version": null
},
{
"model": "wndap330",
"scope": null,
"trust": 0.8,
"vendor": "net gear",
"version": null
},
{
"model": "wndap330",
"scope": "eq",
"trust": 0.8,
"vendor": "net gear",
"version": "2.1.11 and 3.0.3 other"
},
{
"model": "wndap330",
"scope": "ne",
"trust": 0.3,
"vendor": "netgear",
"version": "3.0.3"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2009-0052"
},
{
"db": "BID",
"id": "36991"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-003170"
},
{
"db": "NVD",
"id": "CVE-2009-0052"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-144"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netgear:wndap330_firmware:2.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netgear:wndap330:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:atheros:ar9160-bc1a_chipset:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2009-0052"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Laurent Butti",
"sources": [
{
"db": "BID",
"id": "36991"
},
{
"db": "PACKETSTORM",
"id": "82665"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-144"
}
],
"trust": 1.0
},
"cve": "CVE-2009-0052",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"exploitabilityScore": 5.1,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Adjacent Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 5.5,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2009-0052",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"exploitabilityScore": 5.1,
"id": "VHN-37498",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:A/AC:L/AU:S/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2009-0052",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200911-144",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-37498",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2009-0052",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-37498"
},
{
"db": "VULMON",
"id": "CVE-2009-0052"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-003170"
},
{
"db": "NVD",
"id": "CVE-2009-0052"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-144"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Atheros wireless driver, as used in Netgear WNDAP330 Wi-Fi access point with firmware 2.1.11 and other versions before 3.0.3 on the Atheros AR9160-BC1A chipset, and other products, allows remote authenticated users to cause a denial of service (device reboot or hang) and possibly execute arbitrary code via a truncated reserved management frame. NETGEAR WNDAP330 is prone to a denial-of-service vulnerability because it fails to properly parse malformed reserved management frames. \nSuccessful exploits will cause the affected device to crash or reboot, denying service to legitimate users. \nWNDAP330 with firmware 2.1.11 is vulnerable. \n\nAssigned CVE:\n-------------\n* CVE-2009-0052\n\nDetails:\n--------\n* The bug can be triggered by a malicious reserved management frame sent\nto the wireless access point (truncated packet). This can be achieved\nonly after a successful 802.11 authentication (in \"Open\" mode according\nto the configuration of the wireless access point) and a successful\n802.11 association with appropriate security parameters (e.g. WPA w/\nTKIP unicast, TKIP multicast) which depends on the configuration of the\nwireless access point. Any other wireless device relying\non this vulnerable wireless driver is likely to be vulnerable. \n\nCredits:\n--------\n* This vulnerability was discovered by Laurent Butti from France Telecom\n/ Orange\n. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management) \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nNetgear WNDAP330 Management Frame Denial of Service\n\nSECUNIA ADVISORY ID:\nSA37344\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37344/\n\nDESCRIPTION:\nA vulnerability has been reported in Netgear WNDAP330, which can be\nexploited by malicious people to cause a DoS (Denial of Service). \n\nThe vulnerability is caused due to an unspecified error in the\nparsing of management frames, which can be exploited to reboot or\nhang an affected device. \n\nThe vulnerability is reported in firmware version 2.1.11. Other\nversions may also be affected. \n\nSOLUTION:\nUpdate to version 3.0.3. \nhttp://kb.netgear.com/app/answers/detail/a_id/12199\n\nPROVIDED AND/OR DISCOVERED BY:\nLaurent Butti from France Telecom / Orange\n\nORIGINAL ADVISORY:\nhttp://archives.neohapsis.com/archives/bugtraq/current/0070.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2009-0052"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-003170"
},
{
"db": "BID",
"id": "36991"
},
{
"db": "VULHUB",
"id": "VHN-37498"
},
{
"db": "VULMON",
"id": "CVE-2009-0052"
},
{
"db": "PACKETSTORM",
"id": "82665"
},
{
"db": "PACKETSTORM",
"id": "82583"
}
],
"trust": 2.25
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-37498",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-37498"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2009-0052",
"trust": 3.0
},
{
"db": "BID",
"id": "36991",
"trust": 2.1
},
{
"db": "SECUNIA",
"id": "37344",
"trust": 1.9
},
{
"db": "OSVDB",
"id": "59880",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2009-3212",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2009-003170",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200911-144",
"trust": 0.7
},
{
"db": "BUGTRAQ",
"id": "20091110 ATHEROS DRIVER RESERVED FRAME VULNERABILITY",
"trust": 0.6
},
{
"db": "XF",
"id": "54216",
"trust": 0.6
},
{
"db": "XF",
"id": "330",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "82665",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-37498",
"trust": 0.1
},
{
"db": "VUPEN",
"id": "2009/3212",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2009-0052",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "82583",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-37498"
},
{
"db": "VULMON",
"id": "CVE-2009-0052"
},
{
"db": "BID",
"id": "36991"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-003170"
},
{
"db": "PACKETSTORM",
"id": "82665"
},
{
"db": "PACKETSTORM",
"id": "82583"
},
{
"db": "NVD",
"id": "CVE-2009-0052"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-144"
}
]
},
"id": "VAR-200911-0002",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-37498"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:35:27.772000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.atheros.com/"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.netgear.com/"
},
{
"title": "wifuzzit",
"trust": 0.1,
"url": "https://github.com/0xd012/wifuzzit "
},
{
"title": "wifuzzit",
"trust": 0.1,
"url": "https://github.com/flowerhack/wifuzzit "
},
{
"title": "wifuzzit",
"trust": 0.1,
"url": "https://github.com/84kaliplexon3/wifuzzit "
},
{
"title": "wifuzzit",
"trust": 0.1,
"url": "https://github.com/plexone2019/wifuzzit "
},
{
"title": "wifuzzit",
"trust": 0.1,
"url": "https://github.com/wi-fi-analyzer/wifuzzit "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2009-0052"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-003170"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2009-0052"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "http://www.securityfocus.com/bid/36991"
},
{
"trust": 1.8,
"url": "http://www.osvdb.org/59880"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/37344"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2009/3212"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/archive/1/507777/100/0/threaded"
},
{
"trust": 1.2,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54216"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0052"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0052"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/54216"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/507777/100/0/threaded"
},
{
"trust": 0.4,
"url": "http://archives.neohapsis.com/archives/bugtraq/current/0070.html"
},
{
"trust": 0.4,
"url": "http://kb.netgear.com/app/answers/detail/a_id/12199"
},
{
"trust": 0.3,
"url": "http://www.netgear.com"
},
{
"trust": 0.3,
"url": "/archive/1/507777"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://github.com/0xd012/wifuzzit"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-0052"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/business_solutions/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/37344/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-37498"
},
{
"db": "VULMON",
"id": "CVE-2009-0052"
},
{
"db": "BID",
"id": "36991"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-003170"
},
{
"db": "PACKETSTORM",
"id": "82665"
},
{
"db": "PACKETSTORM",
"id": "82583"
},
{
"db": "NVD",
"id": "CVE-2009-0052"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-144"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-37498"
},
{
"db": "VULMON",
"id": "CVE-2009-0052"
},
{
"db": "BID",
"id": "36991"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-003170"
},
{
"db": "PACKETSTORM",
"id": "82665"
},
{
"db": "PACKETSTORM",
"id": "82583"
},
{
"db": "NVD",
"id": "CVE-2009-0052"
},
{
"db": "CNNVD",
"id": "CNNVD-200911-144"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-11-12T00:00:00",
"db": "VULHUB",
"id": "VHN-37498"
},
{
"date": "2009-11-12T00:00:00",
"db": "VULMON",
"id": "CVE-2009-0052"
},
{
"date": "2009-11-11T00:00:00",
"db": "BID",
"id": "36991"
},
{
"date": "2012-06-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-003170"
},
{
"date": "2009-11-17T01:44:34",
"db": "PACKETSTORM",
"id": "82665"
},
{
"date": "2009-11-16T09:28:42",
"db": "PACKETSTORM",
"id": "82583"
},
{
"date": "2009-11-12T23:30:00.577000",
"db": "NVD",
"id": "CVE-2009-0052"
},
{
"date": "2009-11-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200911-144"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-11T00:00:00",
"db": "VULHUB",
"id": "VHN-37498"
},
{
"date": "2018-10-11T00:00:00",
"db": "VULMON",
"id": "CVE-2009-0052"
},
{
"date": "2010-07-21T19:16:00",
"db": "BID",
"id": "36991"
},
{
"date": "2012-06-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-003170"
},
{
"date": "2018-10-11T20:59:49.343000",
"db": "NVD",
"id": "CVE-2009-0052"
},
{
"date": "2009-11-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200911-144"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "specific network environment",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200911-144"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Atheros AR9160-BC1A On chipset Netgear WNDAP330 Wi-Fi Used by access points Atheros Service disruption in wireless drivers (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-003170"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200911-144"
}
],
"trust": 0.6
}
}