var-201308-0205
Vulnerability from variot
Buffer overflow in Dell BIOS on Dell Latitude D###, E####, XT2, and Z600 devices, and Dell Precision M#### devices, allows local users to bypass intended BIOS signing requirements and install arbitrary BIOS images by leveraging administrative privileges and providing a crafted rbu_packet.pktNum value in conjunction with a crafted rbu_packet.pktSize value. Dell Multiple offers Latitude Laptop and Precision Mobile Workstation of BIOS A buffer overflow vulnerability exists in the update process. Dell Multiple offers Latitude Laptop and Precision Mobile Workstation Then BIOS In the update process, the update is performed after verifying the signature of the update image. This update process includes rbu_packet.pktNum and rbu_packet.pktSize A buffer overflow vulnerability exists due to the value of. By using this vulnerability, signature verification was avoided and crafted BIOS It becomes possible to update to.By having a specially crafted updater run, rootkit Or malicious code BIOS May be written. Attackers may leverage these issues to execute arbitrary code in the context of the affected application. Failed attacks will cause denial-of-service conditions. Dell Latitude and Precision are a series of notebook computer products released by Dell in the United States. BIOS (Basic Input-Output System) is a set of programs solidified on the ROM chip on the computer motherboard. It stores the most important basic input and output programs of the computer, system setting information, and self-test programs after startup. and system self-starter
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201308-0205", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "latitude z600", "scope": "eq", "trust": 1.6, "vendor": "dell", "version": null }, { "model": "precision m6400", "scope": "eq", "trust": 1.6, "vendor": "dell", "version": null }, { "model": "latitude xt2", "scope": "eq", "trust": 1.6, "vendor": "dell", "version": null }, { "model": "latitude e5400", "scope": "eq", "trust": 1.6, "vendor": "dell", "version": null }, { "model": "precision m6500", "scope": "eq", "trust": 1.6, "vendor": "dell", "version": null }, { "model": "latitude d631", "scope": "eq", "trust": 1.6, "vendor": "dell", "version": null }, { "model": "latitude d531", "scope": "eq", "trust": 1.6, "vendor": "dell", "version": null }, { "model": "precision m2300", "scope": "eq", "trust": 1.6, "vendor": "dell", "version": null }, { "model": "latitude d630", "scope": "eq", "trust": 1.6, "vendor": "dell", "version": null }, { "model": "latitude d530", "scope": "eq", "trust": 1.6, "vendor": "dell", "version": null }, { "model": "precision m6500", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "precision m6400", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "precision m6300", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "precision m4400", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "precision m4300", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "precision m2400", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "precision m2300", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "latitude z600", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "latitude e6500", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "latitude e6400 atg", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "latitude e6400", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "latitude e5500", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "latitude e5400", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "latitude e4300", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "latitude e4200", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "latitude d830", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "latitude d631", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "latitude d630", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "latitude d531", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "latitude d530", "scope": null, "trust": 1.1, "vendor": "dell", "version": null }, { "model": "latitude e6400 atg xfr", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": null }, { "model": "precision m4300", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": null }, { "model": "latitude e6400 atg", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": null }, { "model": "latitude e6400", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": null }, { "model": "latitude e5500", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": null }, { "model": "latitude e4200", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": null }, { "model": "precision m6300", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": null }, { "model": "precision m2400", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": null }, { "model": "latitude e4300", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": null }, { "model": "latitude d830", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": null }, { "model": "precision m4400", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": null }, { "model": "latitude e6500", "scope": "eq", "trust": 1.0, "vendor": "dell", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell computer", "version": null }, { "model": "latitude e6400 / atg / xfr", "scope": null, "trust": 0.8, "vendor": "dell", "version": null }, { "model": "latitude xt2", "scope": null, "trust": 0.8, "vendor": "dell", "version": null }, { "model": "latitude e6400 xfr", "scope": null, "trust": 0.3, "vendor": "dell", "version": null }, { "model": "bios", "scope": "eq", "trust": 0.3, "vendor": "dell", "version": "0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#912156" }, { "db": "BID", "id": "61792" }, { "db": "JVNDB", "id": "JVNDB-2013-003762" }, { "db": "NVD", "id": "CVE-2013-3582" }, { "db": "CNNVD", "id": "CNNVD-201308-267" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dell:latitude_d531:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:latitude_d630:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:latitude_d631:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:latitude_d830:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:latitude_d530:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:latitude_e6400_atg_xfr:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:latitude_e6500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:precision_m4300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:precision_m6300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:latitude_e5400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:latitude_z600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:latitude_e4200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:latitude_e6400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:precision_m4400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:precision_m6500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:latitude_xt2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:precision_m2300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:latitude_e5500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:latitude_e4300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:latitude_e6400_atg:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:precision_m2400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:dell:precision_m6400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-3582" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Corey Kallenberg, John Butterworth, Xeno Kovah of the MITRE Corporation and Rick Martinez from Dell.", "sources": [ { "db": "BID", "id": "61792" }, { "db": "CNNVD", "id": "CNNVD-201308-267" } ], "trust": 0.9 }, "cve": "CVE-2013-3582", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "availabilityRequirement": "NOT DEFINED", "baseScore": 6.2, "collateralDamagePotential": "NOT DEFINED", "confidentialityImpact": "COMPLETE", "confidentialityRequirement": "NOT DEFINED", "enviromentalScore": 3.7, "exploitability": "PROOF-OF-CONCEPT", "exploitabilityScore": 1.9, "id": "CVE-2013-3582", "impactScore": 10.0, "integrityImpact": "COMPLETE", "integrityRequirement": "NOT DEFINED", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "remediationLevel": "OFFICIAL FIX", "reportConfidence": "CONFIRMED", "severity": "MEDIUM", "targetDistribution": "MEDIUM", "trust": 0.8, "userInterationRequired": null, "vector_string": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.6, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2013-3582", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "VHN-63584", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-3582", "trust": 1.8, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-3582", "trust": 0.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201308-267", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-63584", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#912156" }, { "db": "VULHUB", "id": "VHN-63584" }, { "db": "JVNDB", "id": "JVNDB-2013-003762" }, { "db": "NVD", "id": "CVE-2013-3582" }, { "db": "CNNVD", "id": "CNNVD-201308-267" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in Dell BIOS on Dell Latitude D###, E####, XT2, and Z600 devices, and Dell Precision M#### devices, allows local users to bypass intended BIOS signing requirements and install arbitrary BIOS images by leveraging administrative privileges and providing a crafted rbu_packet.pktNum value in conjunction with a crafted rbu_packet.pktSize value. Dell Multiple offers Latitude Laptop and Precision Mobile Workstation of BIOS A buffer overflow vulnerability exists in the update process. Dell Multiple offers Latitude Laptop and Precision Mobile Workstation Then BIOS In the update process, the update is performed after verifying the signature of the update image. This update process includes rbu_packet.pktNum and rbu_packet.pktSize A buffer overflow vulnerability exists due to the value of. By using this vulnerability, signature verification was avoided and crafted BIOS It becomes possible to update to.By having a specially crafted updater run, rootkit Or malicious code BIOS May be written. \nAttackers may leverage these issues to execute arbitrary code in the context of the affected application. Failed attacks will cause denial-of-service conditions. Dell Latitude and Precision are a series of notebook computer products released by Dell in the United States. BIOS (Basic Input-Output System) is a set of programs solidified on the ROM chip on the computer motherboard. It stores the most important basic input and output programs of the computer, system setting information, and self-test programs after startup. and system self-starter", "sources": [ { "db": "NVD", "id": "CVE-2013-3582" }, { "db": "CERT/CC", "id": "VU#912156" }, { "db": "JVNDB", "id": "JVNDB-2013-003762" }, { "db": "BID", "id": "61792" }, { "db": "VULHUB", "id": "VHN-63584" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-3582", "trust": 3.6 }, { "db": "CERT/CC", "id": "VU#912156", "trust": 3.6 }, { "db": "BID", "id": "61792", "trust": 1.0 }, { "db": "JVN", "id": "JVNVU95005184", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-003762", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201308-267", "trust": 0.7 }, { "db": "CERT/CC", "id": "HTTP://WWW.KB.CERT.ORG/VULS/ID/BLUU-99HSLA", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-63584", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#912156" }, { "db": "VULHUB", "id": "VHN-63584" }, { "db": "BID", "id": "61792" }, { "db": "JVNDB", "id": "JVNDB-2013-003762" }, { "db": "NVD", "id": "CVE-2013-3582" }, { "db": "CNNVD", "id": "CNNVD-201308-267" } ] }, "id": "VAR-201308-0205", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-63584" } ], "trust": 0.54285715 }, "last_update_date": "2023-12-18T13:09:30.162000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Dell Support - Official Site:", "trust": 0.8, "url": "http://www.dell.com/support/home/us/en/19?c=us\u0026l=en\u0026s=dhs" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003762" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 2.7 } ], "sources": [ { "db": "CERT/CC", "id": "VU#912156" }, { "db": "VULHUB", "id": "VHN-63584" }, { "db": "JVNDB", "id": "JVNDB-2013-003762" }, { "db": "NVD", "id": "CVE-2013-3582" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://www.blackhat.com/us-13/archives.html#butterworth" }, { "trust": 2.8, "url": "http://www.kb.cert.org/vuls/id/912156" }, { "trust": 2.5, "url": "http://www.kb.cert.org/vuls/id/bluu-99hsla" }, { "trust": 1.9, "url": "http://www.mitre.org/work/cybersecurity/blog/cyber_tools_butterworth.html" }, { "trust": 1.7, "url": "https://media.blackhat.com/us-13/us-13-butterworth-bios-security-slides.pdf" }, { "trust": 1.7, "url": "https://media.blackhat.com/us-13/us-13-butterworth-bios-security-wp.pdf" }, { "trust": 1.6, "url": "http://support.dell.com/" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3582" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95005184/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3582" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/61792" }, { "trust": 0.3, "url": "http://dell.com" } ], "sources": [ { "db": "CERT/CC", "id": "VU#912156" }, { "db": "VULHUB", "id": "VHN-63584" }, { "db": "BID", "id": "61792" }, { "db": "JVNDB", "id": "JVNDB-2013-003762" }, { "db": "NVD", "id": "CVE-2013-3582" }, { "db": "CNNVD", "id": "CNNVD-201308-267" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#912156" }, { "db": "VULHUB", "id": "VHN-63584" }, { "db": "BID", "id": "61792" }, { "db": "JVNDB", "id": "JVNDB-2013-003762" }, { "db": "NVD", "id": "CVE-2013-3582" }, { "db": "CNNVD", "id": "CNNVD-201308-267" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-08-15T00:00:00", "db": "CERT/CC", "id": "VU#912156" }, { "date": "2013-08-28T00:00:00", "db": "VULHUB", "id": "VHN-63584" }, { "date": "2013-08-15T00:00:00", "db": "BID", "id": "61792" }, { "date": "2013-08-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003762" }, { "date": "2013-08-28T13:13:58.223000", "db": "NVD", "id": "CVE-2013-3582" }, { "date": "2013-08-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-267" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-08-22T00:00:00", "db": "CERT/CC", "id": "VU#912156" }, { "date": "2013-10-07T00:00:00", "db": "VULHUB", "id": "VHN-63584" }, { "date": "2013-08-15T00:00:00", "db": "BID", "id": "61792" }, { "date": "2013-08-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003762" }, { "date": "2013-10-07T18:04:28.603000", "db": "NVD", "id": "CVE-2013-3582" }, { "date": "2013-08-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-267" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-267" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dell BIOS in some Latitude laptops and Precision Mobile Workstations vulnerable to buffer overflow", "sources": [ { "db": "CERT/CC", "id": "VU#912156" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-267" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.