ID CVE-2009-4293
Summary Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets.
References
Vulnerable Configurations
  • cpe:2.3:a:iij:seil\/x1_firmware:2.30:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/x1_firmware:2.30:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/x1_firmware:2.40:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/x1_firmware:2.40:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/x1_firmware:2.41:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/x1_firmware:2.41:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/x1_firmware:2.42:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/x1_firmware:2.42:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/x1_firmware:2.50:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/x1_firmware:2.50:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/x1_firmware:2.51:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/x1_firmware:2.51:*:*:*:*:*:*:*
  • cpe:2.3:h:iij:seil\/x1:*:*:*:*:*:*:*:*
    cpe:2.3:h:iij:seil\/x1:*:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/b1_firmware:2.30:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/b1_firmware:2.30:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/b1_firmware:2.40:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/b1_firmware:2.40:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/b1_firmware:2.41:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/b1_firmware:2.41:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/b1_firmware:2.42:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/b1_firmware:2.42:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/b1_firmware:2.50:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/b1_firmware:2.50:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/b1_firmware:2.51:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/b1_firmware:2.51:*:*:*:*:*:*:*
  • cpe:2.3:h:iij:seil\/b1:*:*:*:*:*:*:*:*
    cpe:2.3:h:iij:seil\/b1:*:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/x2_firmware:2.30:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/x2_firmware:2.30:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/x2_firmware:2.40:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/x2_firmware:2.40:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/x2_firmware:2.41:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/x2_firmware:2.41:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/x2_firmware:2.42:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/x2_firmware:2.42:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/x2_firmware:2.50:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/x2_firmware:2.50:*:*:*:*:*:*:*
  • cpe:2.3:a:iij:seil\/x2_firmware:2.51:*:*:*:*:*:*:*
    cpe:2.3:a:iij:seil\/x2_firmware:2.51:*:*:*:*:*:*:*
  • cpe:2.3:h:iij:seil\/x2:*:*:*:*:*:*:*:*
    cpe:2.3:h:iij:seil\/x2:*:*:*:*:*:*:*:*
CVSS
Base: 7.1 (as of 17-08-2017 - 01:31)
Impact:
Exploitability:
CWE CWE-16
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:C
refmap via4
confirm http://www.seil.jp/seilseries/security/2009/a00674.php
jvn JVN#13011682
jvndb JVNDB-2009-000070
osvdb 59361
secunia 37154
vupen ADV-2009-3111
xf seil-gre-dos(54050)
Last major update 17-08-2017 - 01:31
Published 10-12-2009 - 23:30
Last modified 17-08-2017 - 01:31
Back to Top