var-201306-0209
Vulnerability from variot
The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response. Huawei AR routers and Huawei S series switches are network devices of Huawei products. Attackers may be able to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Huawei Access Router (AR) is a low-end router product developed by Huawei in China. This product provides mobile and fixed network access methods, suitable for enterprise networks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0209", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "s2700", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s3300hi", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s3500", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s3700", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s3900", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s5100", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s5600", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "s7800", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "r6305" }, { "model": "ar 18-1x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "r0130" }, { "model": "ar 18-2x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "r1712" }, { "model": "ar 18-3x", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "r0118" }, { "model": "s2000", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "r6305" }, { "model": "s2300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "r6305" }, { "model": "s3000", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "r6305" }, { "model": "s3300", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "r6305" }, { "model": "s8500", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r1631" }, { "model": "s8500", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "r1632" }, { "model": "ar 19\\/29\\/49", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "r2207" }, { "model": "ar 28\\/46", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "r0311" }, { "model": "ar 19/29/49", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "r2207" }, { "model": "ar 28/46", "scope": "lte", "trust": 0.8, "vendor": "huawei", "version": "r0311" }, { "model": "s8500", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "r1631 and r1632" }, { "model": "ar routers", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s2000", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3000", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3500", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s3900", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5100", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s5600", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s7800", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "s8500", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 18 1x", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 18 2x", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 18 3x", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 19 29 49", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ar 28 46", "version": "*" }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s2000", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s2300", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s2700", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3000", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3300", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3300hi", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3500", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3700", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s3900", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s5100", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s5600", "version": null }, { "model": "r6305", "scope": null, "trust": 0.2, "vendor": "s7800", "version": null }, { "model": "r1631", "scope": null, "trust": 0.2, "vendor": "s8500", "version": null }, { "model": "r1632", "scope": null, "trust": 0.2, "vendor": "s8500", "version": null } ], "sources": [ { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "db": "NVD", "id": "CVE-2012-6570" }, { "db": "CNNVD", "id": "CNNVD-201306-406" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ar_28\\/46:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r0311", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_18-3x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r0118", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_18-2x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r1712", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_18-1x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r0130", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2207", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:s8500:r1631:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s8500:r1632:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2000:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3000:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3900:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5600:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3300hi:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3700:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s3500:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2300:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s2700:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s5100:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:huawei:s7800:r6305:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-6570" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Felix Lindner of Recurity Labs GmbH", "sources": [ { "db": "BID", "id": "60712" } ], "trust": 0.3 }, "cve": "CVE-2012-6570", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2012-6570", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2013-08072", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "e44f6a90-2352-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-59851", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-6570", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2013-08072", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201306-406", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-59851", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "VULHUB", "id": "VHN-59851" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "db": "NVD", "id": "CVE-2012-6570" }, { "db": "CNNVD", "id": "CNNVD-201306-406" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response. Huawei AR routers and Huawei S series switches are network devices of Huawei products. \nAttackers may be able to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Huawei Access Router (AR) is a low-end router product developed by Huawei in China. This product provides mobile and fixed network access methods, suitable for enterprise networks", "sources": [ { "db": "NVD", "id": "CVE-2012-6570" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "BID", "id": "60712" }, { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-59851" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-6570", "trust": 3.6 }, { "db": "BID", "id": "60712", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201306-406", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2013-08072", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-006007", "trust": 0.8 }, { "db": "IVD", "id": "E44F6A90-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-59851", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "VULHUB", "id": "VHN-59851" }, { "db": "BID", "id": "60712" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "db": "NVD", "id": "CVE-2012-6570" }, { "db": "CNNVD", "id": "CNNVD-201306-406" } ] }, "id": "VAR-201306-0209", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "VULHUB", "id": "VHN-59851" } ], "trust": 1.53885397 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08072" } ] }, "last_update_date": "2023-12-18T13:53:29.193000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20120808-03-HTTP-Module", "trust": 0.8, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm" }, { "title": "Huawei AR Router and Switch HTTP Module Header Field Handling Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/34802" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-59851" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "db": "NVD", "id": "CVE-2012-6570" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194361.htm" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6570" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6570" }, { "trust": 0.3, "url": "http://www.huawei.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "VULHUB", "id": "VHN-59851" }, { "db": "BID", "id": "60712" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "db": "NVD", "id": "CVE-2012-6570" }, { "db": "CNNVD", "id": "CNNVD-201306-406" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-08072" }, { "db": "VULHUB", "id": "VHN-59851" }, { "db": "BID", "id": "60712" }, { "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "db": "NVD", "id": "CVE-2012-6570" }, { "db": "CNNVD", "id": "CNNVD-201306-406" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-25T00:00:00", "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "date": "2013-06-25T00:00:00", "db": "CNVD", "id": "CNVD-2013-08072" }, { "date": "2013-06-20T00:00:00", "db": "VULHUB", "id": "VHN-59851" }, { "date": "2013-06-20T00:00:00", "db": "BID", "id": "60712" }, { "date": "2013-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "date": "2013-06-20T15:55:00.967000", "db": "NVD", "id": "CVE-2012-6570" }, { "date": "2013-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-406" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-25T00:00:00", "db": "CNVD", "id": "CNVD-2013-08072" }, { "date": "2013-06-21T00:00:00", "db": "VULHUB", "id": "VHN-59851" }, { "date": "2015-03-19T08:38:00", "db": "BID", "id": "60712" }, { "date": "2013-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-006007" }, { "date": "2013-06-21T04:00:00", "db": "NVD", "id": "CVE-2012-6570" }, { "date": "2013-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-406" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-406" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei of AR Heap-based buffer overflow vulnerability in router and switch products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-006007" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "e44f6a90-2352-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201306-406" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.