Executive Summary

Informations
Name CVE-2014-1452 First vendor Publication 2014-01-21
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:A/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 5.8 Attack Range Adjacent network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 6.5 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stack-based buffer overflow in lib/snmpagent.c in bsnmpd, as used in FreeBSD 8.3 through 10.0, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted GETBULK PDU request.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1452

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 11

Nessus® Vulnerability Scanner

Date Description
2016-08-12 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_4c96ecf25fd911e6a6c314dae9d210b8.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://svnweb.freebsd.org/base?view=revision&amp%3Brevision=260636
Source Url
BID http://www.securityfocus.com/bid/64967
FREEBSD http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc
SECTRACK http://www.securitytracker.com/id/1029616
SECUNIA http://secunia.com/advisories/56496

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Date Informations
2024-02-02 01:26:26
  • Multiple Updates
2024-02-01 12:07:48
  • Multiple Updates
2023-11-07 21:45:42
  • Multiple Updates
2023-09-05 12:25:02
  • Multiple Updates
2023-09-05 01:07:42
  • Multiple Updates
2023-09-02 12:25:00
  • Multiple Updates
2023-09-02 01:07:48
  • Multiple Updates
2023-08-12 12:27:15
  • Multiple Updates
2023-08-12 01:07:19
  • Multiple Updates
2023-08-11 12:23:08
  • Multiple Updates
2023-08-11 01:07:29
  • Multiple Updates
2023-08-06 12:22:30
  • Multiple Updates
2023-08-06 01:07:17
  • Multiple Updates
2023-08-04 12:22:32
  • Multiple Updates
2023-08-04 01:07:21
  • Multiple Updates
2023-07-14 12:22:30
  • Multiple Updates
2023-07-14 01:07:20
  • Multiple Updates
2023-03-29 01:24:25
  • Multiple Updates
2023-03-28 12:07:41
  • Multiple Updates
2022-10-11 12:20:19
  • Multiple Updates
2022-10-11 01:07:29
  • Multiple Updates
2021-05-04 12:30:03
  • Multiple Updates
2021-04-22 01:36:10
  • Multiple Updates
2020-05-23 00:39:54
  • Multiple Updates
2019-03-19 12:06:11
  • Multiple Updates
2019-03-18 17:19:24
  • Multiple Updates
2016-08-13 13:26:56
  • Multiple Updates
2015-11-02 21:22:23
  • Multiple Updates
2015-04-30 09:26:56
  • Multiple Updates
2014-02-21 13:23:38
  • Multiple Updates
2014-01-22 21:21:09
  • Multiple Updates
2014-01-21 21:21:51
  • First insertion