VAR-201308-0274
Vulnerability from variot - Updated: 2024-04-19 22:49The OSPF implementation on HP JD9##A routers; HP J4###A, J484#B, J8###A, JD3##A, JE###A, and JF55#A switches; HP 3COM routers and switches; and HP H3C routers and switches does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote authenticated users to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149. Information disclosure vulnerabilities and denial of service vulnerabilities exist for multiple HP products. HP JD9##A, 3COM, H3C, etc. are all routers and switches of Hewlett-Packard (HP). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03880910
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03880910 Version: 1
HPSBHF02912 rev.1 - HP Networking Products including H3C and 3COM Routers and Switches, OSPF Remote Information Disclosure and Denial of Service
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
References: CVE-2013-4806 (CERT VU#229804 SSRT101224)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Please refer to the RESOLUTION section below for a list of impacted products.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2013-4806 (AV:N/AC:M/Au:S/C:P/I:N/A:C) 7 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION HP has made the following software updates available to resolve the vulnerabilities in the following products:
Fixed Version HP Branded Products Impacted H3C Branded Products Impacted 3Com Branded Products Impacted
R5000_3.14p14 JD935A HP 5012 Router JD943A HP 5232 Router JD944A HP 5642 Router JD945A HP Router 5642 TAA JD946A HP 5682 Router N/A 3Com Router 5642 TAA (3C13755TAA) 3Com Router 5012 (3C13701) 3Com Router 5232 (3C13751) 3Com Router 5642 (3C13755) 3Com Router 5682 (3C13759)
R301X_1.40.23 JD916A HP 3012 Router JD919A HP 3018 Router N/A 3Com Router 3012 (3C13612) 3Com Router 3018 (3C13618)
S5600_3.10.R1702P39 JD391A HP S5600-50C Ethernet Switch JD392A HP S5600-50C-PWR Ethernet Switch JD393A HP S5600-26C Ethernet Switch JD394A HP S5600-26C-PWR Ethernet Switch JD395A HP S5600-26F Ethernet Switch H3C S5600-26C Ethernet Switch (0235A11F) H3C S5600-26C-PWR Ethernet Switch (0235A11G) H3C S5600-26F Ethernet Switch (0235A11H) H3C S5600-50C Ethernet Switch (0235A11D) H3C S5600-50C-PWR Ethernet Switch (0235A11E) N/A
E5500G_03.03.02p19 JE088A HP E5500-24G Switch JE089A HP E5500-24G Switch (TAA) JE090A HP E5500-48G Switch JE091A HP E5500-48G Switch (TAA) JE092A HP E5500-24G-PoE Switch JE093A HP E5500-24G-PoE Switch (TAA) JE094A HP E5500-48G-PoE Switch JE095A HP E5500-48G-PoE Switch (TAA) JE096A HP E5500-24G-SFP Switch JE097A HP E5500-24G-SPF Switch (TAA) JF551A HP SS4 SWITCH 5500G-EI 24PT (no psu) JF552A HP SS4 SWITCH 5500G-EI 48PT(no psu) JF553A HP SS4 5500G-EI 24 PORT SFP (no psu) N/A 3Com SS4 5500G-EI 24 Port SFP (NO PSU) (3CR17259-91) 3Com SS4 Switch 5500G-EI 24PT (NO PSU) (3CR17254-91) 3Com SS4 Switch 5500G-EI 48PT (NO PSU) (3CR17255-91) 3Com Switch 5500G-EI 24 Port (3CR17250-91) 3Com Switch 5500G-EI 48-Port (3CR17251-91) 3Com Switch 5500G-EI PWR 24-Port (3CR17252-91) 3Com Switch 5500G-EI PWR 48-Port (3CR17253-91) 3Com Switch 5500G-EI SFP 24-Port (3CR17258-91) 3Com TAA Compliant 5500G-EI 24-Port (3CR17250TAA-91) 3Com TAA Compliant 5500G-EI 48-Port (3CR17251TAA-91) 3Com TAA Compliant 5500G-EI PWR 24P (3CR17252TAA-91) 3Com TAA Compliant 5500G-EI PWR 48P (3CR17253TAA-91) 3Com TAA Compliant 5500G-EI SFP 24P (3CR17258TAA-91)
E5500_03.03.02p19 JE099A HP E5500-24 SI Switch JE100A HP E5500-48 SI Switch JE101A HP E5500-24 Switch JE102A HP E5500-24 Switch (TAA) JE103A HP E5500-48 Switch JE104A HP E5500-48 Switch (TAA) JE105A HP E5500-24-PoE Switch JE106A HP E5500-24-PoE Switch (TAA) JE107A HP E5500-48-PoE Switch JE108A HP E5500-48-PoE Switch (TAA) JE109A HP E5500-24-SFP Switch, JE110A HP E5500-24-SPF Switch (TAA) N/A 3Com SS4 Switch 5500-SI 28 Port (3CR17151-91) 3Com SS4 Switch 5500-SI 52 Port (3CR17152-91) 3Com Switch 5500-EI 28-Port (3CR17161-91) 3Com Switch 5500-EI 28-Port FX (3CR17181-91) 3Com Switch 5500-EI 52-Port (3CR17162-91) 3Com Switch 5500-EI PWR 28-Port (3CR17171-91) 3Com Switch 5500-EI PWR 52-Port (3CR17172-91) 3Com TAA Switch 5500-EI 28-Port (3CR17161TAA-91) 3Com TAA Switch 5500-EI 28-Port FX (3CR17181TAA-91) 3Com TAA Switch 5500-EI 52-Port (3CR17162TAA-91) 3Com TAA Switch 5500-EI PWR 28-Port (3CR17171TAA-91) 3Com TAA Switch 5500-EI PWR 52-Port (3CR17172TAA-91)
S3600.EI_3.10.R1702P34 JD326A HP 3600-24-PoE EI Switch JD328A HP 3600-48-PoE EI Switch JD331A HP 3600-24 EI Switch JD333A HP 3600-48 EI Switch JD334A HP 3600-24-SFP EI Switch H3C S3600-28F-EI - model LS-3600-28F-EI-OVS (0235A10L) H3C S3600-28P-EI - model LS-3600-28P-EI-OVS (0235A10H) H3C S3600-28P-PWR-EI - model LS-3600-28P-PWR-EI-OVS (0235A10C) H3C S3600-52P-EI - model LS-3600-52P-EI-OVS (0235A10K) H3C S3600-52P-PWR-EI - model LS-3600-52P-PWR-EI-OVS (0235A10E) N/A
E.11.38 J4850A HP ProCurve Switch 5304xl J8166A HP ProCurve Switch 5304xl-32G J4819A HP ProCurve Switch 5308xl J8167A HP ProCurve Switch 5308xl-48G J4849A HP ProCurve Switch 5348xl J4849B HP ProCurve Switch 5348xl J4848A HP ProCurve Switch 5372xl J4848B HP ProCurve Switch 5372xl
N/A N/A
M.10.99 J4906A HP E3400-48G cl Switch J4905A HP ProCurve Switch 3400cl-24G N/A N/A
M.08.140 J8433A HP 6400-6XG CL Switch J8474A HP 6410-6XG CL Switch N/A N/A
HISTORY Version:1 (rev.1) - 8 August 2013 Initial Release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2013 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlIDpdwACgkQ4B86/C0qfVldlwCcDDroDhqjX0UVp4i8jVvizBGx XcQAnjFZJnhpwE7xpI1wxQZ1tdrFvaGL =Q4Dh -----END PGP SIGNATURE-----
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201308-0274",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "h3c ethernet switch",
"scope": "eq",
"trust": 1.6,
"vendor": "hp",
"version": "s5600-26c-pwr"
},
{
"model": "3com router",
"scope": "eq",
"trust": 1.6,
"vendor": "hp",
"version": "5682"
},
{
"model": "3com router",
"scope": "eq",
"trust": 1.6,
"vendor": "hp",
"version": "5012"
},
{
"model": "3com router",
"scope": "eq",
"trust": 1.6,
"vendor": "hp",
"version": "3018"
},
{
"model": "h3c ethernet switch",
"scope": "eq",
"trust": 1.6,
"vendor": "hp",
"version": "s5600-50c"
},
{
"model": "h3c ethernet switch",
"scope": "eq",
"trust": 1.6,
"vendor": "hp",
"version": "s5600-50c-pwr"
},
{
"model": "h3c ethernet switch",
"scope": "eq",
"trust": 1.6,
"vendor": "hp",
"version": "s5600-26c"
},
{
"model": "3com router",
"scope": "eq",
"trust": 1.6,
"vendor": "hp",
"version": "3012"
},
{
"model": "3com router",
"scope": "eq",
"trust": 1.6,
"vendor": "hp",
"version": "5232"
},
{
"model": "3com router",
"scope": "eq",
"trust": 1.6,
"vendor": "hp",
"version": "5642"
},
{
"model": "5500-24g ei switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jd377a"
},
{
"model": "5500-24g si switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jd369a"
},
{
"model": "5500-24g-sfp ei switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jd374a"
},
{
"model": "5500-24g-sfp dc ei switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jd379a"
},
{
"model": "5500g-48 ei 10\\/100\\/1000 no power supply unit switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jf552a"
},
{
"model": "5500-48g si switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jd370a"
},
{
"model": "5500-24g-poe si switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jd371a"
},
{
"model": "5500g-24 ei 10\\/100\\/1000 no power supply unit switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jf551a"
},
{
"model": "5500-24g-poe ei switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jd378a"
},
{
"model": "5500-24g dc ei switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jd373a"
},
{
"model": "5500-48g-poe ei switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jd376a"
},
{
"model": "3com router",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "5642_taa"
},
{
"model": "5500-24g-4sfp hi switch with 2 interface slots",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jg311a"
},
{
"model": "h3c ethernet switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "s5600-26f"
},
{
"model": "5500-48g ei switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jd375a"
},
{
"model": "5500-48g-poe si switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jd372a"
},
{
"model": "5500g-24 ei sfp no power supply unit switch",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "jf553a"
},
{
"model": "3com router",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "3012"
},
{
"model": "3com router",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "3018"
},
{
"model": "3com router",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "5012"
},
{
"model": "3com router",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "5232"
},
{
"model": "3com router",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "5642"
},
{
"model": "3com router",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "5642 taa"
},
{
"model": "3com router",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "5682"
},
{
"model": "3com switch 5500g-ei 24-port",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jf551a"
},
{
"model": "3com switch 5500g-ei 24-port sfp",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jf553a"
},
{
"model": "3com switch 5500g-ei 48-port",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jf552a"
},
{
"model": "h3c ethernet switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "s5600-26c"
},
{
"model": "h3c ethernet switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "s5600-26c-pwr"
},
{
"model": "h3c ethernet switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "s5600-26f"
},
{
"model": "h3c ethernet switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "s5600-50c"
},
{
"model": "h3c ethernet switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "s5600-50c-pwr"
},
{
"model": "hp 5500-24g dc ei switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jd373a"
},
{
"model": "hp 5500-24g ei switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jd377a"
},
{
"model": "hp 5500-24g si switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jd369a"
},
{
"model": "hp 5500-24g-4sfp hi switch with 2 interface slots",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jg311a"
},
{
"model": "hp 5500-24g-poe ei switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jd378a"
},
{
"model": "hp 5500-24g-poe+ si switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jd371a"
},
{
"model": "hp 5500-24g-sfp dc ei switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jd379a"
},
{
"model": "hp 5500-24g-sfp ei switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jd374a"
},
{
"model": "hp 5500-48g ei switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jd375a"
},
{
"model": "hp 5500-48g si switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jd370a"
},
{
"model": "hp 5500-48g-poe ei switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jd376a"
},
{
"model": "hp 5500-48g-poe si switch",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "jd372a"
},
{
"model": "h3c routers switches",
"scope": null,
"trust": 0.6,
"vendor": "hp",
"version": null
},
{
"model": "3com routers switches",
"scope": null,
"trust": 0.6,
"vendor": "hp",
"version": null
},
{
"model": "s5600-50c-pwr ethernet switch jd392a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "s5600-50c ethernet switch jd391a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "s5600-26f ethernet switch jd395a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "s5600-26c-pwr ethernet switch jd394a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "s5600-26c ethernet switch jd393a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "router taa jd945a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "56420"
},
{
"model": "procurve switch 5372xl j4848b",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "procurve switch 5372xl j4848a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "procurve switch 5348xl j4849b",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "procurve switch 5348xl j4849a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "procurve switch 5308xl-48g j8167a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "procurve switch 5308xl j4819a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "procurve switch 5304xl-32g j8166a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "procurve switch 5304xl j4850a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "procurve switch 3400cl-24g j4905a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "je099a hp e5500-24 si switch",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "je088a hp e5500-24g switch",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-48g-poe switch je094a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-48g-poe switch je095a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-48g switch je090a all",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-48g switch je091a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-48-poe switch je107a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-48-poe switch je108a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-48 switch je103a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-48 switch je104a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-48 si switch je100a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-24g-spf switch je097a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-24g-sfp switch je096a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-24g-poe switch je092a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-24g-poe switch je093a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-24g switch je088a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-24g switch je089a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-24-spf switch je110a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-24-sfp switch je109a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-24-poe switch je105a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-24-poe switch je106a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-24 switch je101a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-24 switch je102a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e5500-24 si switch je099a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "e3400-48g cl switch j4906a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "6410-6xg cl switch j8474a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "6400-6xg cl switch j8433a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "router jd946a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "56820"
},
{
"model": "router jd944a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "56420"
},
{
"model": "router jd943a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "52320"
},
{
"model": "router jd935a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "50120"
},
{
"model": "3600-48-poe ei switch jd328a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "ei switch jd333a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3600-480"
},
{
"model": "3600-24-sfp ei switch jd334a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "3600-24-poe ei switch jd326a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "ei switch jd331a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "3600-240"
},
{
"model": "router jd919a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "30180"
},
{
"model": "router jd916a",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "30120"
},
{
"model": "s5600-50c-pwr ethernet switch",
"scope": "eq",
"trust": 0.3,
"vendor": "h3c",
"version": "0"
},
{
"model": "s5600-50c ethernet switch",
"scope": "eq",
"trust": 0.3,
"vendor": "h3c",
"version": "0"
},
{
"model": "s5600-26f ethernet switch",
"scope": "eq",
"trust": 0.3,
"vendor": "h3c",
"version": "0"
},
{
"model": "s5600-26c-pwr ethernet switch",
"scope": "eq",
"trust": 0.3,
"vendor": "h3c",
"version": "0"
},
{
"model": "s5600-26c ethernet switch",
"scope": "eq",
"trust": 0.3,
"vendor": "h3c",
"version": "0"
},
{
"model": "s3600-52p-pwr-ei model ls-3600-52p-pwr-ei-ovs",
"scope": "eq",
"trust": 0.3,
"vendor": "h3c",
"version": "-0"
},
{
"model": "s3600-52p-ei model ls-3600-52p-ei-ovs",
"scope": "eq",
"trust": 0.3,
"vendor": "h3c",
"version": "-0"
},
{
"model": "s3600-28p-pwr-ei model ls-3600-28p-pwr-ei-ovs",
"scope": "eq",
"trust": 0.3,
"vendor": "h3c",
"version": "-0"
},
{
"model": "s3600-28p-ei model ls-3600-28p-ei-ovs",
"scope": "eq",
"trust": 0.3,
"vendor": "h3c",
"version": "-0"
},
{
"model": "s3600-28f-ei model ls-3600-28f-ei-ovs",
"scope": "eq",
"trust": 0.3,
"vendor": "h3c",
"version": "-0"
},
{
"model": "taa switch 5500-ei pwr 52-port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "taa switch 5500-ei pwr 28-port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "taa switch 5500-ei 52-port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "taa switch 5500-ei 28-port fx",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "taa switch 5500-ei 28-port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "taa compliant 5500g-ei sfp 24p",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "taa compliant 5500g-ei pwr 48p",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "taa compliant 5500g-ei pwr 24p",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "taa compliant 5500g-ei 48-port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "taa compliant 5500g-ei 24-port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "switch 5500g-ei sfp 24-port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "switch 5500g-ei pwr 48-port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "switch 5500g-ei pwr 24-port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "switch 5500g-ei 48-port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "switch 5500g-ei port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "240"
},
{
"model": "switch 5500-ei pwr 52-port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "switch 5500-ei pwr 28-port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "switch 5500-ei 52-port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "switch 5500-ei 28-port fx",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "switch 5500-ei 28-port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "ss4 switch 5500g-ei 48pt",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "ss4 switch 5500g-ei 24pt",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "0"
},
{
"model": "ss4 switch 5500-si port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "520"
},
{
"model": "ss4 switch 5500-si port",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "280"
},
{
"model": "ss4 5500g-ei port sfp",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "240"
},
{
"model": "router",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "56820"
},
{
"model": "router taa",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "56420"
},
{
"model": "router",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "56420"
},
{
"model": "router",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "52320"
},
{
"model": "router",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "50120"
},
{
"model": "router",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "30180"
},
{
"model": "router",
"scope": "eq",
"trust": 0.3,
"vendor": "3com",
"version": "30120"
},
{
"model": "s5600-50c-pwr ethernet switch jd392a s5600 3.10.r1702p39",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "s5600-50c ethernet switch jd391a s5600 3.10.r1702p39",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "s5600-26f ethernet switch jd395a s5600 3.10.r1702p39",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "s5600-26c-pwr ethernet switch jd394a s5600 3.10.r1702p39",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "s5600-26c ethernet switch jd393a s5600 3.10.r1702p39",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "router taa jd945a r5000 3.14p14",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": "5642"
},
{
"model": "procurve switch 5372xl j4848b e.11.38",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "procurve switch 5372xl j4848a e.11.38",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "procurve switch 5348xl j4849b e.11.38",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "procurve switch 5348xl j4849a e.11.38",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "procurve switch 5308xl-48g j8167a e.11.38",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "procurve switch 5308xl j4819a e.11.38",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "procurve switch 5304xl-32g j8166a e.11.38",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "procurve switch 5304xl j4850a e.11.38",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "procurve switch 3400cl-24g j4905a m.10.99",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "je099a hp e5500-24 si switch e5500 03.03.02p21",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "je088a hp e5500-24g switch e5500g 03.03.02p21",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-48g-poe switch je094a e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-48g-poe switch je095a e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-48g switch je090a e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-48g switch je091a e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-48-poe switch je107a e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-48-poe switch je108a e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-48 switch je103a e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-48 switch je104a e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-48 si switch je100a e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-24g-spf switch je097a e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-24g-sfp switch je096a e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-24g-poe switch je092a e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-24g-poe switch je093a e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-24g switch je088a e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-24g switch je089a e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-24-spf switch je110a e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-24-sfp switch je109a e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-24-poe switch je105a e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-24-poe switch je106a e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-24 switch je101a e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-24 switch je102a e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e5500-24 si switch je099a e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "e3400-48g cl switch j4906a m.10.99",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "6410-6xg cl switch j8474a m.08.140",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "6400-6xg cl switch j8433a m.08.140",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "router jd946a r5000 3.14p14",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": "5682"
},
{
"model": "router jd944a r5000 3.14p14",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": "5642"
},
{
"model": "router jd943a r5000 3.14p14",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": "5232"
},
{
"model": "router jd935a r5000 3.14p14",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": "5012"
},
{
"model": "3600-48-poe ei switch jd328a s3600.ei 3.10.r1702p",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "ei switch jd333a s3600.ei 3.10.r1702p",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": "3600-48"
},
{
"model": "3600-24-sfp ei switch jd334a s3600.ei 3.10.r1702p",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "3600-24-poe ei switch jd326a s3600.ei 3.10.r1702p",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "ei switch jd331a s3600.ei 3.10.r1702p",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": "3600-24"
},
{
"model": "router jd919a r301x 1.40.23",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": "3018"
},
{
"model": "router jd916a r301x 1.40.23",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": "3012"
},
{
"model": "s5600-50c-pwr ethernet switch s5600 3.10.r1702p39",
"scope": "ne",
"trust": 0.3,
"vendor": "h3c",
"version": null
},
{
"model": "s5600-50c ethernet switch s5600 3.10.r1702p39",
"scope": "ne",
"trust": 0.3,
"vendor": "h3c",
"version": null
},
{
"model": "s5600-26f ethernet switch s5600 3.10.r1702p39",
"scope": "ne",
"trust": 0.3,
"vendor": "h3c",
"version": null
},
{
"model": "s5600-26c-pwr ethernet switch s5600 3.10.r1702p39",
"scope": "ne",
"trust": 0.3,
"vendor": "h3c",
"version": null
},
{
"model": "s5600-26c ethernet switch s5600 3.10.r1702p39",
"scope": "ne",
"trust": 0.3,
"vendor": "h3c",
"version": null
},
{
"model": "s3600-52p-pwr-ei model ls-3600-52p-pwr-ei-ovs s3600.ei 3.10.r1702p",
"scope": "ne",
"trust": 0.3,
"vendor": "h3c",
"version": null
},
{
"model": "s3600-52p-ei model ls-3600-52p-ei-ovs s3600.ei 3.10.r1702p",
"scope": "ne",
"trust": 0.3,
"vendor": "h3c",
"version": null
},
{
"model": "s3600-28p-pwr-ei model ls-3600-28p-pwr-ei-ovs s3600.ei 3.10.r1702p",
"scope": "ne",
"trust": 0.3,
"vendor": "h3c",
"version": null
},
{
"model": "s3600-28p-ei model ls-3600-28p-ei-ovs s3600.ei 3.10.r1702p",
"scope": "ne",
"trust": 0.3,
"vendor": "h3c",
"version": null
},
{
"model": "s3600-28f-ei model ls-3600-28f-ei-ovs s3600.ei 3.10.r1702p",
"scope": "ne",
"trust": 0.3,
"vendor": "h3c",
"version": null
},
{
"model": "taa switch 5500-ei pwr 52-port e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "taa switch 5500-ei pwr 28-port e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "taa switch 5500-ei 52-port e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "taa switch 5500-ei 28-port fx e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "taa switch 5500-ei 28-port e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "taa compliant 5500g-ei sfp 24p e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "taa compliant 5500g-ei pwr 48p e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "taa compliant 5500g-ei pwr 24p e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "taa compliant 5500g-ei 48-port e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "taa compliant 5500g-ei 24-port e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "switch 5500g-ei sfp 24-port e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "switch 5500g-ei pwr 48-port e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "switch 5500g-ei pwr 24-port e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "switch 5500g-ei 48-port e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "switch 5500g-ei port e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": "24"
},
{
"model": "switch 5500-ei pwr 52-port e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "switch 5500-ei pwr 28-port e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "switch 5500-ei 52-port e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "switch 5500-ei 28-port fx e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "switch 5500-ei 28-port e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "ss4 switch 5500g-ei 48pt e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "ss4 switch 5500g-ei 24pt e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": null
},
{
"model": "ss4 switch 5500-si port e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": "52"
},
{
"model": "ss4 switch 5500-si port e5500 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": "28"
},
{
"model": "ss4 5500g-ei port sfp e5500g 03.03.02p19",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": "24"
},
{
"model": "router r5000 3.14p14",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": "5682"
},
{
"model": "router taa r5000 3.14p14",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": "5642"
},
{
"model": "router r5000 3.14p14",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": "5642"
},
{
"model": "router r5000 3.14p14",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": "5232"
},
{
"model": "router r5000 3.14p14",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": "5012"
},
{
"model": "router r301x 1.40.23",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": "3018"
},
{
"model": "router r301x 1.40.23",
"scope": "ne",
"trust": 0.3,
"vendor": "3com",
"version": "3012"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "3com router",
"version": "3012"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "3com router",
"version": "3018"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "3com router",
"version": "5012"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "3com router",
"version": "5232"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "3com router",
"version": "5642"
},
{
"model": "5642 taa",
"scope": null,
"trust": 0.2,
"vendor": "3com router",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "3com router",
"version": "5682"
},
{
"model": "jg311a",
"scope": null,
"trust": 0.2,
"vendor": "5500 24g 4sfp hi switch with 2 interface slots",
"version": null
},
{
"model": "jd378a",
"scope": null,
"trust": 0.2,
"vendor": "5500 24g poe ei switch",
"version": null
},
{
"model": "jd371a",
"scope": null,
"trust": 0.2,
"vendor": "5500 24g poe si switch",
"version": null
},
{
"model": "jd379a",
"scope": null,
"trust": 0.2,
"vendor": "5500 24g sfp dc ei switch",
"version": null
},
{
"model": "jd374a",
"scope": null,
"trust": 0.2,
"vendor": "5500 24g sfp ei switch",
"version": null
},
{
"model": "jd373a",
"scope": null,
"trust": 0.2,
"vendor": "5500 24g dc ei switch",
"version": null
},
{
"model": "jd377a",
"scope": null,
"trust": 0.2,
"vendor": "5500 24g ei switch",
"version": null
},
{
"model": "jd369a",
"scope": null,
"trust": 0.2,
"vendor": "5500 24g si switch",
"version": null
},
{
"model": "jd376a",
"scope": null,
"trust": 0.2,
"vendor": "5500 48g poe ei switch",
"version": null
},
{
"model": "jd372a",
"scope": null,
"trust": 0.2,
"vendor": "5500 48g poe si switch",
"version": null
},
{
"model": "jd375a",
"scope": null,
"trust": 0.2,
"vendor": "5500 48g ei switch",
"version": null
},
{
"model": "jd370a",
"scope": null,
"trust": 0.2,
"vendor": "5500 48g si switch",
"version": null
},
{
"model": "jf551a",
"scope": null,
"trust": 0.2,
"vendor": "5500g 24 ei 10 100 1000 no power supply unit switch",
"version": null
},
{
"model": "jf553a",
"scope": null,
"trust": 0.2,
"vendor": "5500g 24 ei sfp no power supply unit switch",
"version": null
},
{
"model": "jf552a",
"scope": null,
"trust": 0.2,
"vendor": "5500g 48 ei 10 100 1000 no power supply unit switch",
"version": null
},
{
"model": "s5600-26c",
"scope": null,
"trust": 0.2,
"vendor": "h3c ethernet switch",
"version": null
},
{
"model": "s5600-26c-pwr",
"scope": null,
"trust": 0.2,
"vendor": "h3c ethernet switch",
"version": null
},
{
"model": "s5600-26f",
"scope": null,
"trust": 0.2,
"vendor": "h3c ethernet switch",
"version": null
},
{
"model": "s5600-50c",
"scope": null,
"trust": 0.2,
"vendor": "h3c ethernet switch",
"version": null
},
{
"model": "s5600-50c-pwr",
"scope": null,
"trust": 0.2,
"vendor": "h3c ethernet switch",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "c8d06c06-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-12420"
},
{
"db": "BID",
"id": "61691"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003710"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-157"
},
{
"db": "NVD",
"id": "CVE-2013-4806"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:hp:5500-24g-sfp_dc_ei_switch:jd379a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:5500-24g-sfp_ei_switch:jd374a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:5500-24g-4sfp_hi_switch_with_2_interface_slots:jg311a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:3com_router:5642_taa:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:3com_router:3012:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:3com_router:5682:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:5500-24g-poe_ei_switch:jd378a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:5500-24g-poe_si_switch:jd371a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:5500-48g_ei_switch:jd375a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:5500-48g_si_switch:jd370a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-50c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:3com_router:3018:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:5500g-24_ei_sfp_no_power_supply_unit_switch:jf553a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:5500g-48_ei_10\\/100\\/1000_no_power_supply_unit_switch:jf552a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:5500-48g-poe_ei_switch:jd376a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:5500-48g-poe_si_switch:jd372a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-50c-pwr:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:3com_router:5012:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:5500g-24_ei_10\\/100\\/1000_no_power_supply_unit_switch:jf551a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:5500-24g_dc_ei_switch:jd373a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:5500-24g_ei_switch:jd377a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:5500-24g_si_switch:jd369a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:h3c_ethernet_switch:s5600-26c-pwr:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:3com_router:5642:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:hp:3com_router:5232:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-4806"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "HP",
"sources": [
{
"db": "BID",
"id": "61691"
},
{
"db": "PACKETSTORM",
"id": "122758"
}
],
"trust": 0.4
},
"cve": "CVE-2013-4806",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 6.8,
"impactScore": 7.8,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2013-4806",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 6.8,
"id": "CNVD-2013-12420",
"impactScore": 7.8,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 6.8,
"id": "c8d06c06-2352-11e6-abef-000c29c66e3d",
"impactScore": 7.8,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 6.8,
"id": "VHN-64808",
"impactScore": 7.8,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:S/C:P/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-4806",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2013-12420",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201308-157",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "c8d06c06-2352-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-64808",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "c8d06c06-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-12420"
},
{
"db": "VULHUB",
"id": "VHN-64808"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003710"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-157"
},
{
"db": "NVD",
"id": "CVE-2013-4806"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The OSPF implementation on HP JD9##A routers; HP J4###A, J484#B, J8###A, JD3##A, JE###A, and JF55#A switches; HP 3COM routers and switches; and HP H3C routers and switches does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote authenticated users to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149. Information disclosure vulnerabilities and denial of service vulnerabilities exist for multiple HP products. HP JD9##A, 3COM, H3C, etc. are all routers and switches of Hewlett-Packard (HP). -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c03880910\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03880910\nVersion: 1\n\nHPSBHF02912 rev.1 - HP Networking Products including H3C and 3COM Routers and\nSwitches, OSPF Remote Information Disclosure and Denial of Service\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nReferences: CVE-2013-4806 (CERT VU#229804 SSRT101224)\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nPlease refer to the RESOLUTION\n section below for a list of impacted products. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2013-4806 (AV:N/AC:M/Au:S/C:P/I:N/A:C) 7\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\nHP has made the following software updates available to resolve the\nvulnerabilities in the following products:\n\nFixed Version\n HP Branded Products Impacted\n H3C Branded Products Impacted\n 3Com Branded Products Impacted\n\nR5000_3.14p14\n JD935A HP 5012 Router\nJD943A HP 5232 Router\nJD944A HP 5642 Router\nJD945A HP Router 5642 TAA\nJD946A HP 5682 Router\n N/A\n 3Com Router 5642 TAA (3C13755TAA)\n3Com Router 5012 (3C13701)\n3Com Router 5232 (3C13751)\n3Com Router 5642 (3C13755)\n3Com Router 5682 (3C13759)\n\nR301X_1.40.23\n JD916A HP 3012 Router\nJD919A HP 3018 Router\n N/A\n 3Com Router 3012 (3C13612)\n3Com Router 3018 (3C13618)\n\nS5600_3.10.R1702P39\n JD391A HP S5600-50C Ethernet Switch\nJD392A HP S5600-50C-PWR Ethernet Switch\nJD393A HP S5600-26C Ethernet Switch\nJD394A HP S5600-26C-PWR Ethernet Switch\nJD395A HP S5600-26F Ethernet Switch\n H3C S5600-26C Ethernet Switch (0235A11F)\nH3C S5600-26C-PWR Ethernet Switch (0235A11G)\nH3C S5600-26F Ethernet Switch (0235A11H)\nH3C S5600-50C Ethernet Switch (0235A11D)\nH3C S5600-50C-PWR Ethernet Switch (0235A11E)\n N/A\n\nE5500G_03.03.02p19\n JE088A HP E5500-24G Switch\nJE089A HP E5500-24G Switch (TAA)\nJE090A HP E5500-48G Switch\nJE091A HP E5500-48G Switch (TAA)\nJE092A HP E5500-24G-PoE Switch\nJE093A HP E5500-24G-PoE Switch (TAA)\nJE094A HP E5500-48G-PoE Switch\nJE095A HP E5500-48G-PoE Switch (TAA)\nJE096A HP E5500-24G-SFP Switch\nJE097A HP E5500-24G-SPF Switch (TAA)\nJF551A HP SS4 SWITCH 5500G-EI 24PT (no psu)\nJF552A HP SS4 SWITCH 5500G-EI 48PT(no psu)\nJF553A HP SS4 5500G-EI 24 PORT\nSFP (no psu)\n N/A\n 3Com SS4 5500G-EI 24 Port SFP (NO PSU) (3CR17259-91)\n3Com SS4 Switch 5500G-EI 24PT (NO PSU) (3CR17254-91)\n3Com SS4 Switch 5500G-EI 48PT (NO PSU) (3CR17255-91)\n3Com Switch 5500G-EI 24 Port (3CR17250-91)\n3Com Switch 5500G-EI 48-Port (3CR17251-91)\n3Com Switch 5500G-EI PWR 24-Port (3CR17252-91)\n3Com Switch 5500G-EI PWR 48-Port (3CR17253-91)\n3Com Switch 5500G-EI SFP 24-Port (3CR17258-91)\n3Com TAA Compliant 5500G-EI 24-Port (3CR17250TAA-91)\n3Com TAA Compliant 5500G-EI 48-Port (3CR17251TAA-91)\n3Com TAA Compliant 5500G-EI PWR 24P (3CR17252TAA-91)\n3Com TAA Compliant 5500G-EI PWR 48P (3CR17253TAA-91)\n3Com TAA Compliant 5500G-EI SFP 24P (3CR17258TAA-91)\n\nE5500_03.03.02p19\n JE099A HP E5500-24 SI Switch\nJE100A HP E5500-48 SI Switch\nJE101A HP E5500-24 Switch\nJE102A HP E5500-24 Switch (TAA)\nJE103A HP E5500-48 Switch\nJE104A HP E5500-48 Switch (TAA)\nJE105A HP E5500-24-PoE Switch\nJE106A HP E5500-24-PoE Switch (TAA)\nJE107A HP E5500-48-PoE Switch\nJE108A HP E5500-48-PoE Switch (TAA)\nJE109A HP E5500-24-SFP Switch,\nJE110A HP E5500-24-SPF Switch (TAA)\n N/A\n 3Com SS4 Switch 5500-SI 28 Port (3CR17151-91)\n3Com SS4 Switch 5500-SI 52 Port (3CR17152-91)\n3Com Switch 5500-EI 28-Port (3CR17161-91)\n3Com Switch 5500-EI 28-Port FX (3CR17181-91) 3Com Switch 5500-EI 52-Port\n(3CR17162-91)\n3Com Switch 5500-EI PWR 28-Port (3CR17171-91) 3Com Switch 5500-EI PWR 52-Port\n(3CR17172-91)\n3Com TAA Switch 5500-EI 28-Port (3CR17161TAA-91)\n3Com TAA Switch 5500-EI 28-Port FX (3CR17181TAA-91)\n3Com TAA Switch 5500-EI 52-Port (3CR17162TAA-91)\n3Com TAA Switch 5500-EI PWR 28-Port (3CR17171TAA-91)\n3Com TAA Switch 5500-EI PWR 52-Port (3CR17172TAA-91)\n\nS3600.EI_3.10.R1702P34\n JD326A HP 3600-24-PoE EI Switch\nJD328A HP 3600-48-PoE EI Switch\nJD331A HP 3600-24 EI Switch\nJD333A HP 3600-48 EI Switch\nJD334A HP 3600-24-SFP EI Switch\n H3C S3600-28F-EI - model LS-3600-28F-EI-OVS (0235A10L)\nH3C S3600-28P-EI - model LS-3600-28P-EI-OVS (0235A10H)\nH3C S3600-28P-PWR-EI - model LS-3600-28P-PWR-EI-OVS (0235A10C)\nH3C S3600-52P-EI - model LS-3600-52P-EI-OVS (0235A10K)\nH3C S3600-52P-PWR-EI - model LS-3600-52P-PWR-EI-OVS (0235A10E)\n N/A\n\nE.11.38\n J4850A HP ProCurve Switch 5304xl\nJ8166A HP ProCurve Switch 5304xl-32G\nJ4819A HP ProCurve Switch 5308xl\nJ8167A HP ProCurve Switch 5308xl-48G\nJ4849A HP ProCurve Switch 5348xl\nJ4849B HP ProCurve Switch 5348xl\nJ4848A HP ProCurve Switch 5372xl\nJ4848B HP ProCurve Switch 5372xl\n\n N/A\n N/A\n\nM.10.99\n J4906A HP E3400-48G cl Switch\nJ4905A HP ProCurve Switch 3400cl-24G\n N/A\n N/A\n\nM.08.140\n J8433A HP 6400-6XG CL Switch J8474A HP 6410-6XG CL Switch\n N/A\n N/A\n\nHISTORY\nVersion:1 (rev.1) - 8 August 2013 Initial Release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2013 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits;damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.13 (GNU/Linux)\n\niEYEARECAAYFAlIDpdwACgkQ4B86/C0qfVldlwCcDDroDhqjX0UVp4i8jVvizBGx\nXcQAnjFZJnhpwE7xpI1wxQZ1tdrFvaGL\n=Q4Dh\n-----END PGP SIGNATURE-----\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-4806"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003710"
},
{
"db": "CNVD",
"id": "CNVD-2013-12420"
},
{
"db": "BID",
"id": "61691"
},
{
"db": "IVD",
"id": "c8d06c06-2352-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-64808"
},
{
"db": "PACKETSTORM",
"id": "122758"
}
],
"trust": 2.79
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-64808",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-64808"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-4806",
"trust": 3.7
},
{
"db": "CERT/CC",
"id": "VU#229804",
"trust": 2.5
},
{
"db": "BID",
"id": "61691",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201308-157",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2013-12420",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003710",
"trust": 0.8
},
{
"db": "HP",
"id": "SSRT101224",
"trust": 0.6
},
{
"db": "HP",
"id": "HPSBHF02912",
"trust": 0.6
},
{
"db": "IVD",
"id": "C8D06C06-2352-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "122758",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-64808",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "c8d06c06-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-12420"
},
{
"db": "VULHUB",
"id": "VHN-64808"
},
{
"db": "BID",
"id": "61691"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003710"
},
{
"db": "PACKETSTORM",
"id": "122758"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-157"
},
{
"db": "NVD",
"id": "CVE-2013-4806"
}
]
},
"id": "VAR-201308-0274",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "c8d06c06-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-12420"
},
{
"db": "VULHUB",
"id": "VHN-64808"
}
],
"trust": 1.9
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "c8d06c06-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-12420"
}
]
},
"last_update_date": "2024-04-19T22:49:59.231000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "HPSBHF02912 SSRT101224",
"trust": 0.8,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03880910"
},
{
"title": "Patch for multiple HP product input validation vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/38216"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-12420"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003710"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-4806"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://www.kb.cert.org/vuls/id/229804"
},
{
"trust": 2.3,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03880910"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4806"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4806"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/61691"
},
{
"trust": 0.3,
"url": "http://www.3com.com/"
},
{
"trust": 0.3,
"url": " http://www.phptoys.com/product/micro-news.html"
},
{
"trust": 0.3,
"url": "https://h20566.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?spf_p.tpst=kbdocdisplay\u0026spf_p.prp_kbdocdisplay=wsrp-navigationalstate%3ddocid%253demr_na-c03880910-1%257cdoclocale%253d%"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-4806"
},
{
"trust": 0.1,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/"
},
{
"trust": 0.1,
"url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins"
},
{
"trust": 0.1,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-12420"
},
{
"db": "VULHUB",
"id": "VHN-64808"
},
{
"db": "BID",
"id": "61691"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003710"
},
{
"db": "PACKETSTORM",
"id": "122758"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-157"
},
{
"db": "NVD",
"id": "CVE-2013-4806"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "c8d06c06-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-12420"
},
{
"db": "VULHUB",
"id": "VHN-64808"
},
{
"db": "BID",
"id": "61691"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-003710"
},
{
"db": "PACKETSTORM",
"id": "122758"
},
{
"db": "CNNVD",
"id": "CNNVD-201308-157"
},
{
"db": "NVD",
"id": "CVE-2013-4806"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-19T00:00:00",
"db": "IVD",
"id": "c8d06c06-2352-11e6-abef-000c29c66e3d"
},
{
"date": "2013-08-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-12420"
},
{
"date": "2013-08-12T00:00:00",
"db": "VULHUB",
"id": "VHN-64808"
},
{
"date": "2013-08-08T00:00:00",
"db": "BID",
"id": "61691"
},
{
"date": "2013-08-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003710"
},
{
"date": "2013-08-09T02:19:40",
"db": "PACKETSTORM",
"id": "122758"
},
{
"date": "2013-08-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201308-157"
},
{
"date": "2013-08-12T10:58:49.527000",
"db": "NVD",
"id": "CVE-2013-4806"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-12420"
},
{
"date": "2014-01-04T00:00:00",
"db": "VULHUB",
"id": "VHN-64808"
},
{
"date": "2013-08-08T00:00:00",
"db": "BID",
"id": "61691"
},
{
"date": "2014-02-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-003710"
},
{
"date": "2013-08-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201308-157"
},
{
"date": "2014-01-04T04:49:15.410000",
"db": "NVD",
"id": "CVE-2013-4806"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201308-157"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural HP Product OSPF Service disruption in implementations (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-003710"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201308-157"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.