var-200202-0006
Vulnerability from variot
Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available. Multiple vendor SNMPv1 Trap handling implementations contain vulnerabilities that may allow unauthorized privileged access, denial-of-service conditions, or unstable behavior . If your site uses SNMP in any capacity, the CERT/CC encourages you to read the information provided below. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ SNMP Protocol is status and performance information MIB (Management Information Base) Protocol used to exchange Management side SNMP Managers such as managed routers, switches and printers SNMP Communicates with management network devices called agents. Because of its wide acceptance in the market, SNMP Has become the standard for SNMP protocol version1 Is SNMPv1 Is the most widely implemented. this SNMPv1 Sent from the agent to the manager in the implementation of SNMP Trap message and sent from the manager to the agent SNMP Decrypt the request message / There are problems in interpreting. If this problem is used by an attacker, the following actions may be executed. Many other programs that you implement may also be affected because of a protocol problem. On the target host SNMP If the service is running, an attacker could execute arbitrary code ・ If a buffer overflow attack is feasible and a very long trap message SNMP If the host on which the service is running receives, the application may go into a denial of service state The effects described above vary from application to application. For details, refer to each product.Please refer to the “Overview” for the impact of this vulnerability. Windows 95 is prone to a denial-of-service vulnerability. MPE/iX is an Internet-ready operating system for the HP e3000 class servers. It is possible to crash the service by transmitting to it a maliciously constructed SNMPv1 request PDU. It was previously known as UCD-SNMP. They typically notify the manager that some event has occured or otherwise provide information about the status of the agent. Multiple vulnerabilities have been discovered in a number of SNMP implementations. The vulnerabilities are known to exist in the process of decoding and interpreting SNMP trap messages. Among the possible consequences are denial of service and allowing attackers to compromise target systems. These depend on the individual vulnerabilities in each affected product. HP has confirmed that large traps will cause OpenView Network Node Manager to crash. This may be due to an exploitable buffer overflow condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200202-0006", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 1.6, "vendor": "3com", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "adtran", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "adventnet", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "american power conversion", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "aprisma", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "avaya", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "bea", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "bmc", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "cnt", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "comtek services", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "cscare", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "cacheflow", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "carrier access", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "compaq computer", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "computer associates", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "concord", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "dart", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "dell", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "digital", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "entrada", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "equinox", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "fluke", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "general datacomm", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "hirschmann", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "hitachi", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "iplanet", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "itouch", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "infovista", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "inktomi", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "innerdive", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "ipswitch", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "karlnet", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "lantronix", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "larscom incorporated", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "lotus", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "lucent", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "mg soft", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "mandriva", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "marconi", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "mercury interactive", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "metrobility optical", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "micromuse", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "microsoft", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "monfox", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "multinet", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "nec", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "net snmp", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "network harmoni", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "nbase xyplex", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "netscout", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "netsilicon", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "netscape", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "network appliance", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "nortel", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "novell", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openwave", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "optical access", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "oracle", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "perle", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "powerware", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "radware", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "redback", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "riverstone", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "snmp research", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "sniffer", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "sonicwall", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "sonus", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "stonesoft", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "symantec", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "the sco group sco unix", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "tivoli", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "toshiba", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "unisphere", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "vertical", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "vina", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "wind river", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "world wide packets", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "xerox", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "e security", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "net com", "version": null }, { "model": "aix", "scope": "eq", "trust": 1.1, "vendor": "ibm", "version": "4.3" }, { "model": "aix", "scope": "eq", "trust": 1.1, "vendor": "ibm", "version": "5.1" }, { "model": "snmp", "scope": "eq", "trust": 1.0, "vendor": "snmp", "version": "*" }, { "model": "windows 98se", "scope": null, "trust": 0.9, "vendor": "microsoft", "version": null }, { "model": "windows", "scope": "eq", "trust": 0.9, "vendor": "microsoft", "version": "95" }, { "model": "windows server", "scope": "eq", "trust": 0.9, "vendor": "microsoft", "version": "2000" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nudesign team", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "outback resource group", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "veritas", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "bintec", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "interniche", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ncipher corp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netscreen", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nokia", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "2.6 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "2.6 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "7.0 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "7.0 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (x86)" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "10.00" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "10.10" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "10.20" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.00" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.20" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "10.24" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.04" }, { "model": "windows 2000", "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": "windows 9x", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "95" }, { "model": "windows 9x", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "98" }, { "model": "windows 9x", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "98 scd" }, { "model": "windows 9x", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "me" }, { "model": "windows nt", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "4.0 (server)" }, { "model": "windows nt", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "4.0 (terminal_srv)" }, { "model": "windows nt", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "4.0 (workstation)" }, { "model": "windows xp", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "sp3" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6.2" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.0" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.1" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.2" }, { "model": "windows xp gold", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "0" }, { "model": "windows nt", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "4.0" }, { "model": "mpe/ix", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "6.5" }, { "model": "mpe/ix", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "6.0" }, { "model": "mpe/ix", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "5.5" }, { "model": "mpe/ix", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "5.0" }, { "model": "mpe/ix", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "4.5" }, { "model": "mpe/ix", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "4.0" }, { "model": "ucd-snmp", "scope": "eq", "trust": 0.6, "vendor": "net snmp", "version": "4.2.1" }, { "model": "ucd-snmp", "scope": "eq", "trust": 0.6, "vendor": "net snmp", "version": "4.1.1" }, { "model": "ucd-snmp", "scope": "ne", "trust": 0.6, "vendor": "net snmp", "version": "4.2.2" }, { "model": "snmp", "scope": null, "trust": 0.6, "vendor": "snmp", "version": null }, { "model": "mpe/ix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "sunatm", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.0" }, { "model": "sunatm", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.0.1" }, { "model": "sunatm", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3.0.1" }, { "model": "sunatm", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2.1" }, { "model": "ucd-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "4.1.2" }, { "model": "ucd-snmp", "scope": "ne", "trust": 0.3, "vendor": "net snmp", "version": "4.2.3" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 7.0 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "solaris 2.6 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2.6" }, { "model": "enterprise server ssp", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "100003.5" }, { "model": "enterprise server ssp", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "100003.4" }, { "model": "enterprise server ssp", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "100003.3" }, { "model": "research mid-level manager", "scope": "eq", "trust": 0.3, "vendor": "snmp", "version": "15.3" }, { "model": "research enterpol", "scope": "eq", "trust": 0.3, "vendor": "snmp", "version": "15.3" }, { "model": "research dr-web manager", "scope": "eq", "trust": 0.3, "vendor": "snmp", "version": "15.3" }, { "model": "brocade", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "2.6.0" }, { "model": "networks aos", "scope": null, "trust": 0.3, "vendor": "redback", "version": null }, { "model": "realplayer intranet", "scope": "eq", "trust": 0.3, "vendor": "realnetworks", "version": "5.0" }, { "model": "software tcpware", "scope": "eq", "trust": 0.3, "vendor": "process", "version": "5.5" }, { "model": "software multinet", "scope": "eq", "trust": 0.3, "vendor": "process", "version": "4.4" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.0.1" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.2" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.1" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.0" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.6.5" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.0" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "5.1" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "5.0" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "4.11" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "4.2" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "4.0" }, { "model": "windows xp professional", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows xp home", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows nt workstation sp6a", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp6", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp5", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt workstation", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp6", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp5", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp6a", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp6", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp5", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp6a", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp6", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp5", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt enterprise server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "98" }, { "model": "windows terminal services sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows terminal services sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows terminal services", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows professional sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows professional sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows professional", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows datacenter server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows datacenter server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows datacenter server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows advanced server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows advanced server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows advanced server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "domino snmp agents solaris", "scope": "eq", "trust": 0.3, "vendor": "lotus", "version": "5.0.1x86" }, { "model": "domino snmp agents solaris sparc", "scope": "eq", "trust": 0.3, "vendor": "lotus", "version": "5.0.1" }, { "model": "domino snmp agents hp-ux", "scope": "eq", "trust": 0.3, "vendor": "lotus", "version": "5.0.1" }, { "model": "lrs", "scope": null, "trust": 0.3, "vendor": "lantronix", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.0" }, { "model": "solutions router ip console", "scope": "eq", "trust": 0.3, "vendor": "innerdive", "version": "3.3.0.406" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.3" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.2" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.1" }, { "model": "secure os software for linux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0" }, { "model": "procurve switch 8000m", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "procurve switch 4108gl-bundle", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "procurve switch 4108gl", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "procurve switch 4000m", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "procurve switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2525" }, { "model": "procurve switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2524" }, { "model": "procurve switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2512" }, { "model": "procurve switch 2424m", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "procurve switch 2400m", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "procurve switch 1600m", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ov/sam", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.1" }, { "model": "openview network node manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.10" }, { "model": "openview network node manager solaris", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "openview network node manager nt 4.x/windows", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.22000" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.211.x" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.210.x" }, { "model": "openview network node manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "openview network node manager solaris", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.111.x" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.110.x" }, { "model": "openview network node manager solaris", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "openview network node manager nt 4.x/windows", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.02000" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.011.x" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.010.20" }, { "model": "openview network node manager windows nt", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0.23.51/4.0" }, { "model": "openview network node manager solaris", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.01" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.01" }, { "model": "openview network node manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.01" }, { "model": "openview network node manager solaris", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.11" }, { "model": "openview network node manager hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.11" }, { "model": "openview extensible snmp agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.0" }, { "model": "openview emanate snmp agent solaris", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "14.22.x" }, { "model": "openview emanate snmp agent hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "14.211.x" }, { "model": "openview emanate snmp agent hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "14.210.20" }, { "model": "openview distributed management", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "openview distributed management", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.03" }, { "model": "mc/serviceguard", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jetdirect", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "x.20.00" }, { "model": "jetdirect", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "x.08.32" }, { "model": "jetdirect", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "x.08.00" }, { "model": "ito/vpo/ovo unix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.04" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.24" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.20" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.0" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.20" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.10" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.0" }, { "model": "ems a.03.20", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ems a.03.10", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ems a.03.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "services nmserver", "scope": "eq", "trust": 0.3, "vendor": "comtek", "version": "3.4" }, { "model": "associates unicenter", "scope": null, "trust": 0.3, "vendor": "computer", "version": null }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "caldera", "version": "7.1.1" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "caldera", "version": "7.1.0" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "caldera", "version": "7" }, { "model": "openunix", "scope": "eq", "trust": 0.3, "vendor": "caldera", "version": "8.0" }, { "model": "openserver", "scope": "eq", "trust": 0.3, "vendor": "caldera", "version": "5.0.6" }, { "model": "openserver", "scope": "eq", "trust": 0.3, "vendor": "caldera", "version": "5.0.5" }, { "model": "cacheos", "scope": "eq", "trust": 0.3, "vendor": "cacheflow", "version": "4.0" }, { "model": "cacheos", "scope": "eq", "trust": 0.3, "vendor": "cacheflow", "version": "3.1" }, { "model": "web nms msp edition", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "web nms", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "snmp utilities", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "snmp api", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "mediation server", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "management builder", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "fault management toolkit", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "configuration management toolkit", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "cli api", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "agent toolkit java/jmx edition", "scope": null, "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "agent toolkit c edition", "scope": "eq", "trust": 0.3, "vendor": "adventnet", "version": null }, { "model": "webcache", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "3000" }, { "model": "webcache", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "1000" }, { "model": "switch", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "4900" }, { "model": "switch", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "4400" }, { "model": "switch", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "3300" }, { "model": "switch", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "1100" }, { "model": "ps hub", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "50" }, { "model": "ps hub", "scope": "eq", "trust": 0.3, "vendor": "3com", "version": "40" }, { "model": "dual speed hub", "scope": null, "trust": 0.3, "vendor": "3com", "version": null }, { "model": "brocade .0d", "scope": "ne", "trust": 0.3, "vendor": "sgi", "version": "2.6" }, { "model": "solutions router ip console", "scope": "ne", "trust": 0.3, "vendor": "innerdive", "version": "3.3.0.407" }, { "model": "jetdirect", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "x.21.00" }, { "model": "jetdirect", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "x.08.32" } ], "sources": [ { "db": "CERT/CC", "id": "VU#107186" }, { "db": "CERT/CC", "id": "VU#854306" }, { "db": "BID", "id": "89608" }, { "db": "BID", "id": "89661" }, { "db": "BID", "id": "5043" }, { "db": "BID", "id": "4732" }, { "db": "BID", "id": "4203" }, { "db": "BID", "id": "4088" }, { "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "db": "CNNVD", "id": "CNNVD-200202-007" }, { "db": "NVD", "id": "CVE-2002-0012" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:snmp:snmp:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2002-0012" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by the Oulu University Secure Programming Group.", "sources": [ { "db": "BID", "id": "5043" }, { "db": "BID", "id": "4203" }, { "db": "BID", "id": "4088" } ], "trust": 0.9 }, "cve": "CVE-2002-0012", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2002-0012", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2002-0012", "trust": 1.8, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#107186", "trust": 0.8, "value": "69.26" }, { "author": "CARNEGIE MELLON", "id": "VU#854306", "trust": 0.8, "value": "42.64" }, { "author": "CNNVD", "id": "CNNVD-200202-007", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#107186" }, { "db": "CERT/CC", "id": "VU#854306" }, { "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "db": "CNNVD", "id": "CNNVD-200202-007" }, { "db": "NVD", "id": "CVE-2002-0012" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available. Multiple vendor SNMPv1 Trap handling implementations contain vulnerabilities that may allow unauthorized privileged access, denial-of-service conditions, or unstable behavior . If your site uses SNMP in any capacity, the CERT/CC encourages you to read the information provided below. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ SNMP Protocol is status and performance information MIB (Management Information Base) Protocol used to exchange Management side SNMP Managers such as managed routers, switches and printers SNMP Communicates with management network devices called agents. Because of its wide acceptance in the market, SNMP Has become the standard for SNMP protocol version1 Is SNMPv1 Is the most widely implemented. this SNMPv1 Sent from the agent to the manager in the implementation of SNMP Trap message and sent from the manager to the agent SNMP Decrypt the request message / There are problems in interpreting. If this problem is used by an attacker, the following actions may be executed. Many other programs that you implement may also be affected because of a protocol problem. On the target host SNMP If the service is running, an attacker could execute arbitrary code \u30fb If a buffer overflow attack is feasible and a very long trap message SNMP If the host on which the service is running receives, the application may go into a denial of service state The effects described above vary from application to application. For details, refer to each product.Please refer to the \u201cOverview\u201d for the impact of this vulnerability. Windows 95 is prone to a denial-of-service vulnerability. MPE/iX is an Internet-ready operating system for the HP e3000 class servers. It is possible to crash the service by transmitting to it a maliciously constructed SNMPv1 request PDU. It was previously known as UCD-SNMP. They typically notify the manager that some event has occured or otherwise provide information about the status of the agent. \nMultiple vulnerabilities have been discovered in a number of SNMP implementations. The vulnerabilities are known to exist in the process of decoding and interpreting SNMP trap messages. \nAmong the possible consequences are denial of service and allowing attackers to compromise target systems. These depend on the individual vulnerabilities in each affected product. \nHP has confirmed that large traps will cause OpenView Network Node Manager to crash. This may be due to an exploitable buffer overflow condition", "sources": [ { "db": "NVD", "id": "CVE-2002-0012" }, { "db": "CERT/CC", "id": "VU#107186" }, { "db": "CERT/CC", "id": "VU#854306" }, { "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "db": "BID", "id": "89608" }, { "db": "BID", "id": "89661" }, { "db": "BID", "id": "5043" }, { "db": "BID", "id": "4732" }, { "db": "BID", "id": "4203" }, { "db": "BID", "id": "4088" } ], "trust": 4.68 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2002-0012", "trust": 3.9 }, { "db": "CERT/CC", "id": "VU#107186", "trust": 3.2 }, { "db": "BID", "id": "4088", "trust": 2.2 }, { "db": "BID", "id": "4732", "trust": 1.9 }, { "db": "BID", "id": "4089", "trust": 1.9 }, { "db": "BID", "id": "4132", "trust": 1.6 }, { "db": "CERT/CC", "id": "VU#854306", "trust": 1.4 }, { "db": "BID", "id": "5043", "trust": 1.3 }, { "db": "XF", "id": "8177", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2002-000033", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200202-007", "trust": 0.6 }, { "db": "BID", "id": "89608", "trust": 0.3 }, { "db": "BID", "id": "89661", "trust": 0.3 }, { "db": "BID", "id": "4203", "trust": 0.3 } ], "sources": [ { "db": "CERT/CC", "id": "VU#107186" }, { "db": "CERT/CC", "id": "VU#854306" }, { "db": "BID", "id": "89608" }, { "db": "BID", "id": "89661" }, { "db": "BID", "id": "5043" }, { "db": "BID", "id": "4732" }, { "db": "BID", "id": "4203" }, { "db": "BID", "id": "4088" }, { "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "db": "CNNVD", "id": "CNNVD-200202-007" }, { "db": "NVD", "id": "CVE-2002-0012" } ] }, "id": "VAR-200202-0006", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.489583335 }, "last_update_date": "2024-07-23T22:34:48.127000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HPSBUX00184", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00964944" }, { "title": "MS02-006", "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/ms02-006.mspx" }, { "title": "RHSA-2001:163", "trust": 0.8, "url": "http://rhn.redhat.com/errata/rhsa-2001-163.html" }, { "title": "#00215", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-22-00215-1" }, { "title": "#00215", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-22-00215-3" }, { "title": "IBM Information for VU#107186", "trust": 0.8, "url": "http://www.kb.cert.org/vuls/id/iafy-55krcv" }, { "title": "MS02-006", "trust": 0.8, "url": "http://www.microsoft.com/japan/technet/security/bulletin/ms02-006.mspx" }, { "title": "RHSA-2001:163", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2001-163j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2002-000033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "db": "NVD", "id": "CVE-2002-0012" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "http://www.cert.org/advisories/ca-2002-03.html" }, { "trust": 2.4, "url": "http://www.kb.cert.org/vuls/id/107186" }, { "trust": 1.6, "url": "http://www.ee.oulu.fi/research/ouspg/protos/" }, { "trust": 1.6, "url": "http://www.cert.org/tech_tips/denial_of_service.html" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc3000.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc1212.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc1213.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc1215.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc1270.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc2570.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc2571.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc2572.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc2573.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc2574.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc2575.txt" }, { "trust": 1.6, "url": "http://www.ietf.org/rfc/rfc2576.txt" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/4088" }, { "trust": 1.6, "url": "http://online.securityfocus.com/bid/4132" }, { "trust": 1.6, "url": "http://online.securityfocus.com/bid/4732" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/4089" }, { "trust": 1.6, "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html" }, { "trust": 1.4, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-0012" }, { "trust": 1.0, "url": "ftp://patches.sgi.com/support/free/security/advisories/20020201-01-a" }, { "trust": 1.0, "url": "http://www.iss.net/security_center/alerts/advise110.php" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2001-163.html" }, { "trust": 1.0, "url": "http://www.securityfocus.com/advisories/4211" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/5043" }, { "trust": 1.0, "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-006" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1048" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a144" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a161" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a298" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/m-042.shtml" }, { "trust": 0.8, "url": "http://www.ipa.go.jp/security/ciadr/20020213snmp.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2002/wr020701.txt" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2002/wr020901.txt" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2002/at020001.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnca-2002-03" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-0012" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/8177" }, { "trust": 0.6, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-0013" }, { "trust": 0.6, "url": "http://www.microsoft.com/technet/security/bulletin/ms02-006.asp" }, { "trust": 0.6, "url": "http://www.kb.cert.org/vuls/id/854306" }, { "trust": 0.3, "url": "http://online.securityfocus.com/bid/4088" }, { "trust": 0.3, "url": "http://online.securityfocus.com/bid/4089" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f44605" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f42769" }, { "trust": 0.3, "url": "http://online.securityfocus.com/news/474" }, { "trust": 0.3, "url": "http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms02-006.asp" }, { "trust": 0.3, "url": "http://otn.oracle.com/deploy/security/pdf/snmp_2002_alert.pdf" } ], "sources": [ { "db": "CERT/CC", "id": "VU#107186" }, { "db": "CERT/CC", "id": "VU#854306" }, { "db": "BID", "id": "89608" }, { "db": "BID", "id": "89661" }, { "db": "BID", "id": "5043" }, { "db": "BID", "id": "4732" }, { "db": "BID", "id": "4203" }, { "db": "BID", "id": "4088" }, { "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "db": "NVD", "id": "CVE-2002-0012" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#107186" }, { "db": "CERT/CC", "id": "VU#854306" }, { "db": "BID", "id": "89608" }, { "db": "BID", "id": "89661" }, { "db": "BID", "id": "5043" }, { "db": "BID", "id": "4732" }, { "db": "BID", "id": "4203" }, { "db": "BID", "id": "4088" }, { "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "db": "CNNVD", "id": "CNNVD-200202-007" }, { "db": "NVD", "id": "CVE-2002-0012" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2002-01-16T00:00:00", "db": "CERT/CC", "id": "VU#107186" }, { "date": "2002-02-12T00:00:00", "db": "CERT/CC", "id": "VU#854306" }, { "date": "2002-03-08T00:00:00", "db": "BID", "id": "89608" }, { "date": "2002-03-08T00:00:00", "db": "BID", "id": "89661" }, { "date": "2002-06-18T00:00:00", "db": "BID", "id": "5043" }, { "date": "2002-05-13T00:00:00", "db": "BID", "id": "4732" }, { "date": "2002-02-27T00:00:00", "db": "BID", "id": "4203" }, { "date": "2002-02-12T00:00:00", "db": "BID", "id": "4088" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "date": "2002-02-13T00:00:00", "db": "CNNVD", "id": "CNNVD-200202-007" }, { "date": "2002-02-13T05:00:00", "db": "NVD", "id": "CVE-2002-0012" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-11-07T00:00:00", "db": "CERT/CC", "id": "VU#107186" }, { "date": "2007-11-07T00:00:00", "db": "CERT/CC", "id": "VU#854306" }, { "date": "2002-03-08T00:00:00", "db": "BID", "id": "89608" }, { "date": "2002-03-08T00:00:00", "db": "BID", "id": "89661" }, { "date": "2009-07-11T13:56:00", "db": "BID", "id": "5043" }, { "date": "2002-05-13T00:00:00", "db": "BID", "id": "4732" }, { "date": "2009-07-11T10:56:00", "db": "BID", "id": "4203" }, { "date": "2009-07-11T10:56:00", "db": "BID", "id": "4088" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2002-000033" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200202-007" }, { "date": "2018-10-12T21:30:46.750000", "db": "NVD", "id": "CVE-2002-0012" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "89608" }, { "db": "BID", "id": "89661" }, { "db": "BID", "id": "5043" }, { "db": "BID", "id": "4732" }, { "db": "BID", "id": "4203" }, { "db": "BID", "id": "4088" } ], "trust": 1.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in SNMPv1 trap handling", "sources": [ { "db": "CERT/CC", "id": "VU#107186" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "89608" }, { "db": "BID", "id": "89661" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.