JPCERT/CC 2019-10-04

This commit is contained in:
Ikuya Fukumoto 2019-10-04 22:38:03 +09:00
parent bde1057c5d
commit 02f69837f8

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-6015",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
},
{
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "firmware versions 1.1.7 and earlier"
}
]
},
"product_name": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B"
}
]
},
"vendor_name": "FON Wireless Limited"
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2019-6015",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "novuln"
}
]
}
]
}