This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Iij First view 2009-12-10
Product Seil/x2 Firmware Last view 2011-03-01
Version 2.30 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:iij:seil/x2_firmware

Activity : Overall

Related : CVE

  Date Alert Description
8.3 2011-03-01 CVE-2011-0454

Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.

5.8 2010-08-30 CVE-2010-2363

The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.

7.1 2009-12-10 CVE-2009-4293

Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets.

CWE : Common Weakness Enumeration

%idName
33% (1) CWE-264 Permissions, Privileges, and Access Controls
33% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
33% (1) CWE-16 Configuration

Open Source Vulnerability Database (OSVDB)

id Description
74890 SEIL Routers PPP Access Concentrator (PPPAC) Crafted PPPoE Packet Handling Re...
67453 SEIL Routers IPv6 Unicast RPF Spoofing Filter Bypass
59361 SEIL Routers Crafted GRE Packet Remote DoS