2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-4293" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-12-10T23:30:00.420" ,
"lastModified" : "2017-08-17T01:31:31.773" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
} ,
{
"lang" : "es" ,
"value" : "El firmware Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 desde v2.30 hasta v2.51, cuando NAT esta activado, permite a atacantes remotos producir una denegaci\u00f3n de servicio (reinicio de sistema) a trav\u00e9s de paquetes GRE manipulados."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:C" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 7.1
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-16"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E10BC7EF-5A3B-4026-9EDA-15061EBF814E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "23564CCD-7EF3-4457-99FB-BFE966D35D5B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BD52B307-EA12-48FC-ACD5-01AEDED44A5D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF6EC374-64D2-4990-A4C4-86529CCF27C5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DAAA887F-7944-4C31-A191-0A39BC4E6544"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9A63E557-3BA6-4E0E-8597-BAA112B21DEF"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2CA0DBD0-9181-45DB-83AB-74B63C4644DA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "488614FD-E4DF-4E6B-B928-444D98076F4A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B6A638B5-5FBC-4193-879D-883CF2777200"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "507272EC-6B90-46DA-9E9A-EF5DCB770E7D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C74FA35-319D-4B10-868A-A6CFAD137978"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4BE3BBD4-FB2E-4543-9149-0452B26FAC31"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C4C47A3C-D478-44E9-8183-735CF9CFBC2A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "416DCB14-271A-4578-9AE7-418C75ADC4C7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FEBFCE3F-FE95-4559-A972-5241D48CB902"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0064F721-57E1-4AC4-A3C3-92E05B64F0F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "509DC30B-7D2F-43A7-9FD3-71FC405F520E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://jvn.jp/en/jp/JVN13011682/index.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://osvdb.org/59361" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/37154" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.seil.jp/seilseries/security/2009/a00674.php" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/3111" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050" ,
"source" : "cve@mitre.org"
}
]
}