VAR-200809-0162

Vulnerability from variot - Updated: 2023-12-18 13:53

Stack-based buffer overflow in SecurityGateway.dll in Alt-N Technologies SecurityGateway 1.0.1 allows remote attackers to execute arbitrary code via a long username parameter. SecurityGateway is prone to a buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized buffer. Failed exploit attempts will result in a denial-of-service condition. SecurityGateway 1.0.1 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------

Want a new job?

http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/


TITLE: Alt-N SecurityGateway "username" Buffer Overflow Vulnerability

SECUNIA ADVISORY ID: SA30497

VERIFY ADVISORY: http://secunia.com/advisories/30497/

CRITICAL: Highly critical

IMPACT: DoS, System access

WHERE:

From remote

SOFTWARE: Alt-N SecurityGateway 1.x http://secunia.com/product/18916/

DESCRIPTION: securfrog has discovered a vulnerability in Alt-N SecurityGateway, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a boundary error in the processing of HTTP requests sent to the administrative web interface.

Successful exploitation allows execution of arbitrary code.

The vulnerability is confirmed in version 1.0.1.

SOLUTION: Restrict network access to the administrative web interface.

PROVIDED AND/OR DISCOVERED BY: securfrog

ORIGINAL ADVISORY: http://milw0rm.com/exploits/5718


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200809-0162",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "securitygateway",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "alt n",
        "version": "1.0.1"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-003460"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4193"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-345"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:alt-n:securitygateway:1.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-4193"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "securfrog",
    "sources": [
      {
        "db": "BID",
        "id": "29457"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-345"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2008-4193",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2008-4193",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-34318",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2008-4193",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200809-345",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-34318",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-34318"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-003460"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4193"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-345"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Stack-based buffer overflow in SecurityGateway.dll in Alt-N Technologies SecurityGateway 1.0.1 allows remote attackers to execute arbitrary code via a long username parameter. SecurityGateway is prone to a buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized buffer. Failed exploit attempts will result in a denial-of-service condition. \nSecurityGateway 1.0.1 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------\n\nWant a new job?\n\nhttp://secunia.com/secunia_security_specialist/\nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\n----------------------------------------------------------------------\n\nTITLE:\nAlt-N SecurityGateway \"username\" Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA30497\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/30497/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nAlt-N SecurityGateway 1.x\nhttp://secunia.com/product/18916/\n\nDESCRIPTION:\nsecurfrog has discovered a vulnerability in Alt-N SecurityGateway,\nwhich can be exploited by malicious people to compromise a vulnerable\nsystem. \n\nThe vulnerability is caused due to a boundary error in the processing\nof HTTP requests sent to the administrative web interface. \n\nSuccessful exploitation allows execution of arbitrary code. \n\nThe vulnerability is confirmed in version 1.0.1. \n\nSOLUTION:\nRestrict network access to the administrative web interface. \n\nPROVIDED AND/OR DISCOVERED BY:\nsecurfrog\n\nORIGINAL ADVISORY:\nhttp://milw0rm.com/exploits/5718\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-4193"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-003460"
      },
      {
        "db": "BID",
        "id": "29457"
      },
      {
        "db": "VULHUB",
        "id": "VHN-34318"
      },
      {
        "db": "PACKETSTORM",
        "id": "66887"
      }
    ],
    "trust": 2.07
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-34318",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-34318"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2008-4193",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "29457",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "30497",
        "trust": 1.9
      },
      {
        "db": "EXPLOIT-DB",
        "id": "5718",
        "trust": 1.8
      },
      {
        "db": "SREASON",
        "id": "4302",
        "trust": 1.7
      },
      {
        "db": "EXPLOIT-DB",
        "id": "5827",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1020156",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-1717",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-003460",
        "trust": 0.8
      },
      {
        "db": "MILW0RM",
        "id": "5827",
        "trust": 0.6
      },
      {
        "db": "MILW0RM",
        "id": "5718",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "42769",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-345",
        "trust": 0.6
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-71305",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "84567",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "16803",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-34318",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "66887",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-34318"
      },
      {
        "db": "BID",
        "id": "29457"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-003460"
      },
      {
        "db": "PACKETSTORM",
        "id": "66887"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4193"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-345"
      }
    ]
  },
  "id": "VAR-200809-0162",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-34318"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:53:50.934000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SecurityGateway for Exchange/SMTP v2.0 Release Notes",
        "trust": 0.8,
        "url": "http://files.altn.com/securitygateway/release/relnotes_en.htm"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-003460"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-34318"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-003460"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4193"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/29457"
      },
      {
        "trust": 1.7,
        "url": "http://files.altn.com/securitygateway/release/relnotes_en.htm"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1020156"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/30497"
      },
      {
        "trust": 1.7,
        "url": "http://securityreason.com/securityalert/4302"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2008/1717/references"
      },
      {
        "trust": 1.1,
        "url": "https://www.exploit-db.com/exploits/5718"
      },
      {
        "trust": 1.1,
        "url": "https://www.exploit-db.com/exploits/5827"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42769"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4193"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4193"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/42769"
      },
      {
        "trust": 0.6,
        "url": "http://www.milw0rm.com/exploits/5827"
      },
      {
        "trust": 0.6,
        "url": "http://www.milw0rm.com/exploits/5718"
      },
      {
        "trust": 0.3,
        "url": "http://www.altn.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.altn.com/products/securitygateway-email-firewall/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/18916/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/"
      },
      {
        "trust": 0.1,
        "url": "http://milw0rm.com/exploits/5718"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_specialist/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/30497/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-34318"
      },
      {
        "db": "BID",
        "id": "29457"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-003460"
      },
      {
        "db": "PACKETSTORM",
        "id": "66887"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4193"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-345"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-34318"
      },
      {
        "db": "BID",
        "id": "29457"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-003460"
      },
      {
        "db": "PACKETSTORM",
        "id": "66887"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4193"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-345"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-09-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-34318"
      },
      {
        "date": "2008-06-01T00:00:00",
        "db": "BID",
        "id": "29457"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-003460"
      },
      {
        "date": "2008-06-02T21:20:05",
        "db": "PACKETSTORM",
        "id": "66887"
      },
      {
        "date": "2008-09-24T11:42:25.297000",
        "db": "NVD",
        "id": "CVE-2008-4193"
      },
      {
        "date": "2008-09-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200809-345"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-09-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-34318"
      },
      {
        "date": "2015-05-07T17:28:00",
        "db": "BID",
        "id": "29457"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-003460"
      },
      {
        "date": "2017-09-29T01:32:02.883000",
        "db": "NVD",
        "id": "CVE-2008-4193"
      },
      {
        "date": "2009-04-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200809-345"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-345"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SecurityGateway \u0027SecurityGateway.dll\u0027 Remote Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "29457"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-345"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200809-345"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…