Summary
Detail | |||
---|---|---|---|
Vendor | Iij | First view | 2009-12-10 |
Product | Seil/x2 Firmware | Last view | 2011-03-01 |
Version | 2.30 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:iij:seil/x2_firmware |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.3 | 2011-03-01 | CVE-2011-0454 | Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet. |
5.8 | 2010-08-30 | CVE-2010-2363 | The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address. |
7.1 | 2009-12-10 | CVE-2009-4293 | Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
33% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
33% (1) | CWE-16 | Configuration |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
74890 | SEIL Routers PPP Access Concentrator (PPPAC) Crafted PPPoE Packet Handling Re... |
67453 | SEIL Routers IPv6 Unicast RPF Spoofing Filter Bypass |
59361 | SEIL Routers Crafted GRE Packet Remote DoS |