mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
67 lines
2.2 KiB
JSON
67 lines
2.2 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2019-6015",
|
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "FON Wireless Limited",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "firmware versions 1.1.7 and earlier"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "DNS amplification attacks"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942",
|
|
"refsource": "MISC",
|
|
"name": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
|
|
},
|
|
{
|
|
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html",
|
|
"refsource": "MISC",
|
|
"name": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
|
|
}
|
|
]
|
|
}
|
|
} |