VAR-201402-0242
Vulnerability from variot - Updated: 2023-12-18 13:20The SNMP implementation in Siemens RuggedCom ROS before 3.11, ROS 3.11 for RS950G, ROS 3.12 before 3.12.4, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (device outage) via crafted packets. RuggedCom Inc is the world's leading manufacturer of high performance networking and communications equipment for industrial environments. RuggedCom Rugged Operating System is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause the management services of the devices to become unresponsive resulting in denial-of-service conditions. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany. A resource management error vulnerability exists in the SNMP implementation in Siemens RuggedCom ROS. The following versions are affected: Siemens RuggedCom ROS 3.10.1 and prior, ROS 3.11 for RS950G, ROS 3.12 prior to 3.12.4, ROS 4.0 for RSG2488
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201402-0242",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ruggedcom rugged operating system",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.11.5"
},
{
"model": "ruggedcom rugged operating system",
"scope": "gt",
"trust": 1.0,
"vendor": "siemens",
"version": "4.0"
},
{
"model": "ruggedcom rugged operating system",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.11.0"
},
{
"model": "ruggedcom rugged operating system",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.12.4"
},
{
"model": "ruggedcom rugged operating system",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "3.12"
},
{
"model": "ruggedcom rugged operating system",
"scope": "gt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.11.0"
},
{
"model": "ruggedcom rugged operating system",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "4.1.0"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.12.1"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.8.5"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.7.9"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.2.5"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.9.3"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.4.9"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.5.4"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.6.6"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.3.6"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.12.4"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.11 for rs950g"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "4.0 for rsg2488"
},
{
"model": "ruggedcom rugged operating system",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "3.12"
},
{
"model": "rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "ruggedcom",
"version": "3.x"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "3.10.1"
},
{
"model": "rugged operating system",
"scope": "eq",
"trust": 0.3,
"vendor": "ruggedcom",
"version": "3.10.1"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.2,
"vendor": "siemens",
"version": "3.12"
},
{
"model": "ruggedcom rugged operating system",
"scope": "eq",
"trust": 0.2,
"vendor": "siemens",
"version": "3.12.2"
},
{
"model": "ros",
"scope": "lt",
"trust": 0.2,
"vendor": "ruggedcom",
"version": "3.11"
},
{
"model": "ros",
"scope": "lt",
"trust": 0.2,
"vendor": "ruggedcom",
"version": "3.11.5"
},
{
"model": "ros",
"scope": "lt",
"trust": 0.2,
"vendor": "ruggedcom",
"version": "3.12.4"
},
{
"model": "ros",
"scope": "lt",
"trust": 0.2,
"vendor": "ruggedcom",
"version": "4.1.0"
}
],
"sources": [
{
"db": "IVD",
"id": "339f3144-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-01107"
},
{
"db": "BID",
"id": "65625"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001459"
},
{
"db": "NVD",
"id": "CVE-2014-1966"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-352"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.11.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.12.4",
"versionStartIncluding": "3.12",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.11.5",
"versionStartExcluding": "3.11.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_rs950g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_rugged_operating_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.1.0",
"versionStartExcluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_rsg2488:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-1966"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ling Toh Koh, Ng Yi Teng, Seyed Dawood Sajjadi Torshizi, Ryan Lee and Ho Ping\nHou from EV-Dynamic, Malaysia",
"sources": [
{
"db": "BID",
"id": "65625"
}
],
"trust": 0.3
},
"cve": "CVE-2014-1966",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-1966",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2014-01107",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "339f3144-2352-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-69905",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-1966",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2014-01107",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201402-352",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "339f3144-2352-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-69905",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "339f3144-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-01107"
},
{
"db": "VULHUB",
"id": "VHN-69905"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001459"
},
{
"db": "NVD",
"id": "CVE-2014-1966"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-352"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The SNMP implementation in Siemens RuggedCom ROS before 3.11, ROS 3.11 for RS950G, ROS 3.12 before 3.12.4, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (device outage) via crafted packets. RuggedCom Inc is the world\u0027s leading manufacturer of high performance networking and communications equipment for industrial environments. RuggedCom Rugged Operating System is prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to cause the management services of the devices to become unresponsive resulting in denial-of-service conditions. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany. A resource management error vulnerability exists in the SNMP implementation in Siemens RuggedCom ROS. The following versions are affected: Siemens RuggedCom ROS 3.10.1 and prior, ROS 3.11 for RS950G, ROS 3.12 prior to 3.12.4, ROS 4.0 for RSG2488",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-1966"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001459"
},
{
"db": "CNVD",
"id": "CNVD-2014-01107"
},
{
"db": "BID",
"id": "65625"
},
{
"db": "IVD",
"id": "339f3144-2352-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-69905"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-1966",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-14-051-03",
"trust": 2.5
},
{
"db": "SIEMENS",
"id": "SSA-892342",
"trust": 2.3
},
{
"db": "BID",
"id": "65625",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201402-352",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2014-01107",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001459",
"trust": 0.8
},
{
"db": "SECUNIA",
"id": "56973",
"trust": 0.6
},
{
"db": "IVD",
"id": "339F3144-2352-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "SEEBUG",
"id": "SSVID-61563",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-69905",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "339f3144-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-01107"
},
{
"db": "VULHUB",
"id": "VHN-69905"
},
{
"db": "BID",
"id": "65625"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001459"
},
{
"db": "NVD",
"id": "CVE-2014-1966"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-352"
}
]
},
"id": "VAR-201402-0242",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "339f3144-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-01107"
},
{
"db": "VULHUB",
"id": "VHN-69905"
}
],
"trust": 1.5444674833333334
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "339f3144-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-01107"
}
]
},
"last_update_date": "2023-12-18T13:20:00.467000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-892342",
"trust": 0.8,
"url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-892342.pdf"
},
{
"title": "RuggedCom Rugged Operating System Patch for SMTP Protocol Denial of Service Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/43753"
},
{
"title": "Siemens RuggedCom ROS Remediation of resource management error vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=180264"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01107"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001459"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-352"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-399",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-69905"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001459"
},
{
"db": "NVD",
"id": "CVE-2014-1966"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-14-051-03"
},
{
"trust": 2.3,
"url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-892342.pdf"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1966"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-1966"
},
{
"trust": 0.6,
"url": "http://secunia.com/advisories/56973/"
},
{
"trust": 0.3,
"url": "http://www.ruggedcom.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01107"
},
{
"db": "VULHUB",
"id": "VHN-69905"
},
{
"db": "BID",
"id": "65625"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001459"
},
{
"db": "NVD",
"id": "CVE-2014-1966"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-352"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "339f3144-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-01107"
},
{
"db": "VULHUB",
"id": "VHN-69905"
},
{
"db": "BID",
"id": "65625"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001459"
},
{
"db": "NVD",
"id": "CVE-2014-1966"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-352"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-02-20T00:00:00",
"db": "IVD",
"id": "339f3144-2352-11e6-abef-000c29c66e3d"
},
{
"date": "2014-02-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-01107"
},
{
"date": "2014-02-24T00:00:00",
"db": "VULHUB",
"id": "VHN-69905"
},
{
"date": "2014-02-18T00:00:00",
"db": "BID",
"id": "65625"
},
{
"date": "2014-02-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-001459"
},
{
"date": "2014-02-24T04:48:10.210000",
"db": "NVD",
"id": "CVE-2014-1966"
},
{
"date": "2014-02-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201402-352"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-04-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-01107"
},
{
"date": "2014-02-24T00:00:00",
"db": "VULHUB",
"id": "VHN-69905"
},
{
"date": "2014-05-29T01:16:00",
"db": "BID",
"id": "65625"
},
{
"date": "2014-02-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-001459"
},
{
"date": "2022-02-01T16:53:41.257000",
"db": "NVD",
"id": "CVE-2014-1966"
},
{
"date": "2022-02-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201402-352"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201402-352"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "RuggedCom Rugged Operating System SMTP Protocol Denial of Service Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01107"
},
{
"db": "BID",
"id": "65625"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Resource management error",
"sources": [
{
"db": "IVD",
"id": "339f3144-2352-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201402-352"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.