cvelist/2018/0xxx/CVE-2018-0423.json

92 lines
3.1 KiB
JSON
Raw Normal View History

2017-11-27 03:03:59 -05:00
{
2018-10-05 10:06:42 -04:00
"CVE_data_meta" : {
"ASSIGNER" : "psirt@cisco.com",
"DATE_PUBLIC" : "2018-09-05T16:00:00-0500",
"ID" : "CVE-2018-0423",
"STATE" : "PUBLIC",
"TITLE" : "Cisco RV110W, RV130W, and RV215W Routers Management Interface Buffer Overflow Vulnerability"
},
"affects" : {
"vendor" : {
"vendor_data" : [
2018-10-04 04:16:56 +00:00
{
2018-10-05 10:06:42 -04:00
"product" : {
"product_data" : [
{
"product_name" : "Cisco RV130W Wireless-N Multifunction VPN Router Firmware ",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "Cisco"
2018-10-04 04:16:56 +00:00
}
2018-10-05 10:06:42 -04:00
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to cause a denial of service condition or to execute arbitrary code. The vulnerability is due to improper boundary restrictions on user-supplied input in the Guest user feature of the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to a targeted device, triggering a buffer overflow condition. A successful exploit could allow the attacker to cause the device to stop responding, resulting in a denial of service condition, or could allow the attacker to execute arbitrary code."
}
]
},
"impact" : {
"cvss" : {
"baseScore" : "9.8",
"version" : "3.0"
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "CWE-119"
}
2018-10-04 04:16:56 +00:00
]
2018-10-05 10:06:42 -04:00
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20180905 Cisco RV110W, RV130W, and RV215W Routers Management Interface Buffer Overflow Vulnerability",
"refsource" : "CISCO",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-overflow"
2018-10-07 06:03:25 -04:00
},
{
"name" : "105285",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/105285"
},
{
"name" : "1041675",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041675"
2018-10-05 10:06:42 -04:00
}
]
},
"source" : {
"advisory" : "cisco-sa-20180905-rv-routers-overflow",
"defect" : [
[
"CSCvj23206",
"CSCvj42727",
"CSCvj42729"
]
],
"discovery" : "UNKNOWN"
}
2017-11-27 03:03:59 -05:00
}