JVNDB-2010-000032
Vulnerability from jvndb - Published: 2010-08-25 13:54 - Updated:2010-08-25 13:54Summary
SEIL/X Series and SEIL/B1 IPv6 Unicast RPF vulnerability
Details
SEIL/X Series and SEIL/B1 contains a vulnerability in which IPv6 Unicast Reverse Path Forwarding (RPF) does not properly function in strict mode.
SEIL/X Series and SEIL/B1 are routers. SEIL/X Series and SEIL/B1 contains a vulnerability in which IPv6 Unicast Reverse Path Forwarding (RPF) does not properly function in strict mode.
Only IPv6 Unicast RPF in strict mode is vulnerable. According to the developer, IPv6 Unicast RPF in loose mode and IPv4 Unicast RPF are not affected by this vulnerability.
References
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html",
"dc:date": "2010-08-25T13:54+09:00",
"dcterms:issued": "2010-08-25T13:54+09:00",
"dcterms:modified": "2010-08-25T13:54+09:00",
"description": "SEIL/X Series and SEIL/B1 contains a vulnerability in which IPv6 Unicast Reverse Path Forwarding (RPF) does not properly function in strict mode.\r\n\r\nSEIL/X Series and SEIL/B1 are routers. SEIL/X Series and SEIL/B1 contains a vulnerability in which IPv6 Unicast Reverse Path Forwarding (RPF) does not properly function in strict mode.\r\n\r\nOnly IPv6 Unicast RPF in strict mode is vulnerable. According to the developer, IPv6 Unicast RPF in loose mode and IPv4 Unicast RPF are not affected by this vulnerability.",
"link": "https://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html",
"sec:cpe": [
{
"#text": "cpe:/h:iij:seil%2Fb1",
"@product": "SEIL/B1",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:iij:seil%2Fx1",
"@product": "SEIL/X1",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:iij:seil%2Fx2",
"@product": "SEIL/X2",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "4.3",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2010-000032",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN12683004/index.html",
"@id": "JVN#12683004",
"@source": "JVN"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2363",
"@id": "CVE-2010-2363",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2363",
"@id": "CVE-2010-2363",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-Other",
"@title": "No Mapping(CWE-Other)"
}
],
"title": "SEIL/X Series and SEIL/B1 IPv6 Unicast RPF vulnerability"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…