Search criteria

7 vulnerabilities by Clavister

CVE-2024-3142 (GCVE-0-2024-3142)

Vulnerability from cvelistv5 – Published: 2024-04-02 00:00 – Updated: 2024-08-28 13:25
VLAI?
Title
Clavister E10/E80 Setting cross-site request forgery
Summary
A vulnerability was found in Clavister E10 and E80 up to 14.00.10 and classified as problematic. This issue affects some unknown processing of the component Setting Handler. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 14.00.11 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-258917 was assigned to this vulnerability.
CWE
  • CWE-352 - Cross-Site Request Forgery
Assigner
Impacted products
Vendor Product Version
Clavister E10 Affected: 14.00.0
Affected: 14.00.1
Affected: 14.00.2
Affected: 14.00.3
Affected: 14.00.4
Affected: 14.00.5
Affected: 14.00.6
Affected: 14.00.7
Affected: 14.00.8
Affected: 14.00.9
Affected: 14.00.10
Create a notification for this product.
    Clavister E80 Affected: 14.00.0
Affected: 14.00.1
Affected: 14.00.2
Affected: 14.00.3
Affected: 14.00.4
Affected: 14.00.5
Affected: 14.00.6
Affected: 14.00.7
Affected: 14.00.8
Affected: 14.00.9
Affected: 14.00.10
Create a notification for this product.
Credits
Strik3r (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:05:07.045Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VDB-258917 | Clavister E10/E80 Setting cross-site request forgery",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?id.258917"
          },
          {
            "name": "VDB-258917 | CTI Indicators (IOB, IOC)",
            "tags": [
              "signature",
              "permissions-required",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?ctiid.258917"
          },
          {
            "name": "Submit #303530 | Clavister Clavister E10,E80 - EagleSeries . Cross-Site Request Forgery (CSRF)",
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?submit.303530"
          },
          {
            "tags": [
              "exploit",
              "x_transferred"
            ],
            "url": "https://github.com/strik3r0x1/Vulns/blob/main/CSRF_Clavister-E80,E10.md"
          },
          {
            "tags": [
              "related",
              "x_transferred"
            ],
            "url": "https://docs.clavister.com/repo/cos-core-release-notes/doc/index.html#d0e2260"
          },
          {
            "tags": [
              "patch",
              "x_transferred"
            ],
            "url": "https://my.clavister.com/downloads/?sid=1"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:clavister:e10:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "e10",
            "vendor": "clavister",
            "versions": [
              {
                "status": "affected",
                "version": "14.00.0"
              },
              {
                "status": "affected",
                "version": "14.00.1"
              },
              {
                "status": "affected",
                "version": "14.00.2"
              },
              {
                "status": "affected",
                "version": "14.00.3"
              },
              {
                "status": "affected",
                "version": "14.00.4"
              },
              {
                "status": "affected",
                "version": "14.00.5"
              },
              {
                "status": "affected",
                "version": "14.00.6"
              },
              {
                "status": "affected",
                "version": "14.00.7"
              },
              {
                "status": "affected",
                "version": "14.00.8"
              },
              {
                "status": "affected",
                "version": "14.00.9"
              },
              {
                "status": "affected",
                "version": "14.00.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:clavister:e80:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "e80",
            "vendor": "clavister",
            "versions": [
              {
                "status": "affected",
                "version": "14.00.0"
              },
              {
                "status": "affected",
                "version": "14.00.1"
              },
              {
                "status": "affected",
                "version": "14.00.2"
              },
              {
                "status": "affected",
                "version": "14.00.3"
              },
              {
                "status": "affected",
                "version": "14.00.4"
              },
              {
                "status": "affected",
                "version": "14.00.5"
              },
              {
                "status": "affected",
                "version": "14.00.6"
              },
              {
                "status": "affected",
                "version": "14.00.7"
              },
              {
                "status": "affected",
                "version": "14.00.8"
              },
              {
                "status": "affected",
                "version": "14.00.9"
              },
              {
                "status": "affected",
                "version": "14.00.10"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-3142",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-02T18:25:24.906842Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-28T13:25:28.790Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Setting Handler"
          ],
          "product": "E10",
          "vendor": "Clavister",
          "versions": [
            {
              "status": "affected",
              "version": "14.00.0"
            },
            {
              "status": "affected",
              "version": "14.00.1"
            },
            {
              "status": "affected",
              "version": "14.00.2"
            },
            {
              "status": "affected",
              "version": "14.00.3"
            },
            {
              "status": "affected",
              "version": "14.00.4"
            },
            {
              "status": "affected",
              "version": "14.00.5"
            },
            {
              "status": "affected",
              "version": "14.00.6"
            },
            {
              "status": "affected",
              "version": "14.00.7"
            },
            {
              "status": "affected",
              "version": "14.00.8"
            },
            {
              "status": "affected",
              "version": "14.00.9"
            },
            {
              "status": "affected",
              "version": "14.00.10"
            }
          ]
        },
        {
          "modules": [
            "Setting Handler"
          ],
          "product": "E80",
          "vendor": "Clavister",
          "versions": [
            {
              "status": "affected",
              "version": "14.00.0"
            },
            {
              "status": "affected",
              "version": "14.00.1"
            },
            {
              "status": "affected",
              "version": "14.00.2"
            },
            {
              "status": "affected",
              "version": "14.00.3"
            },
            {
              "status": "affected",
              "version": "14.00.4"
            },
            {
              "status": "affected",
              "version": "14.00.5"
            },
            {
              "status": "affected",
              "version": "14.00.6"
            },
            {
              "status": "affected",
              "version": "14.00.7"
            },
            {
              "status": "affected",
              "version": "14.00.8"
            },
            {
              "status": "affected",
              "version": "14.00.9"
            },
            {
              "status": "affected",
              "version": "14.00.10"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Strik3r (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was found in Clavister E10 and E80 up to 14.00.10 and classified as problematic. This issue affects some unknown processing of the component Setting Handler. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 14.00.11 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-258917 was assigned to this vulnerability."
        },
        {
          "lang": "de",
          "value": "Eine problematische Schwachstelle wurde in Clavister E10 and E80 bis 14.00.10 gefunden. Dies betrifft einen unbekannten Teil der Komponente Setting Handler. Durch Beeinflussen mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version 14.00.11 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 5,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-352",
              "description": "CWE-352 Cross-Site Request Forgery",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-04T12:44:38.094Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-258917 | Clavister E10/E80 Setting cross-site request forgery",
          "tags": [
            "vdb-entry"
          ],
          "url": "https://vuldb.com/?id.258917"
        },
        {
          "name": "VDB-258917 | CTI Indicators (IOB, IOC)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.258917"
        },
        {
          "name": "Submit #303530 | Clavister Clavister E10,E80 - EagleSeries . Cross-Site Request Forgery (CSRF)",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.303530"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/strik3r0x1/Vulns/blob/main/CSRF_Clavister-E80,E10.md"
        },
        {
          "tags": [
            "related"
          ],
          "url": "https://docs.clavister.com/repo/cos-core-release-notes/doc/index.html#d0e2260"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://my.clavister.com/downloads/?sid=1"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2023-10-16T00:00:00.000Z",
          "value": "Countermeasure disclosed"
        },
        {
          "lang": "en",
          "time": "2024-04-01T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2024-04-01T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2024-04-04T14:47:52.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Clavister E10/E80 Setting cross-site request forgery"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2024-3142",
    "datePublished": "2024-04-02T00:00:04.975Z",
    "dateReserved": "2024-04-01T17:49:35.388Z",
    "dateUpdated": "2024-08-28T13:25:28.790Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-3141 (GCVE-0-2024-3141)

Vulnerability from cvelistv5 – Published: 2024-04-01 23:00 – Updated: 2025-03-12 16:41
VLAI?
Title
Clavister E10/E80 Misc Settings Page MiscSettings cross site scripting
Summary
A vulnerability has been found in Clavister E10 and E80 up to 14.00.10 and classified as problematic. This vulnerability affects unknown code of the file /?Page=Node&OBJ=/System/AdvancedSettings/DeviceSettings/MiscSettings of the component Misc Settings Page. The manipulation of the argument WatchdogTimerTime/BufFloodRebootTime/MaxPipeUsers/AVCache Lifetime/HTTPipeliningMaxReq/Reassembly MaxConnections/Reassembly MaxProcessingMem/ScrSaveTime leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 14.00.11 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-258916.
CWE
  • CWE-79 - Cross Site Scripting
Assigner
Impacted products
Vendor Product Version
Clavister E10 Affected: 14.00.0
Affected: 14.00.1
Affected: 14.00.2
Affected: 14.00.3
Affected: 14.00.4
Affected: 14.00.5
Affected: 14.00.6
Affected: 14.00.7
Affected: 14.00.8
Affected: 14.00.9
Affected: 14.00.10
Create a notification for this product.
    Clavister E80 Affected: 14.00.0
Affected: 14.00.1
Affected: 14.00.2
Affected: 14.00.3
Affected: 14.00.4
Affected: 14.00.5
Affected: 14.00.6
Affected: 14.00.7
Affected: 14.00.8
Affected: 14.00.9
Affected: 14.00.10
Create a notification for this product.
Credits
Strik3r (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:clivester:e10:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "e10",
            "vendor": "clivester",
            "versions": [
              {
                "status": "affected",
                "version": "14.00.0"
              },
              {
                "status": "affected",
                "version": "14.00.1"
              },
              {
                "status": "affected",
                "version": "14.00.2"
              },
              {
                "status": "affected",
                "version": "14.00.3"
              },
              {
                "status": "affected",
                "version": "14.00.4"
              },
              {
                "status": "affected",
                "version": "14.00.5"
              },
              {
                "status": "affected",
                "version": "14.00.6"
              },
              {
                "status": "affected",
                "version": "14.00.7"
              },
              {
                "status": "affected",
                "version": "14.00.8"
              },
              {
                "status": "affected",
                "version": "14.00.9"
              },
              {
                "status": "affected",
                "version": "14.00.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:clavister:e80:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "e80",
            "vendor": "clavister",
            "versions": [
              {
                "status": "affected",
                "version": "14.00.0"
              },
              {
                "status": "affected",
                "version": "14.00.1"
              },
              {
                "status": "affected",
                "version": "14.00.2"
              },
              {
                "status": "affected",
                "version": "14.00.3"
              },
              {
                "status": "affected",
                "version": "14.00.4"
              },
              {
                "status": "affected",
                "version": "14.00.5"
              },
              {
                "status": "affected",
                "version": "14.00.6"
              },
              {
                "status": "affected",
                "version": "14.00.7"
              },
              {
                "status": "affected",
                "version": "14.00.8"
              },
              {
                "status": "affected",
                "version": "14.00.9"
              },
              {
                "status": "affected",
                "version": "14.00.10"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-3141",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-02T15:05:29.194655Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-12T16:41:36.487Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T19:32:42.904Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VDB-258916 | Clavister E10/E80 Misc Settings Page MiscSettings cross site scripting",
            "tags": [
              "vdb-entry",
              "technical-description",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?id.258916"
          },
          {
            "name": "VDB-258916 | CTI Indicators (IOB, IOC, TTP, IOA)",
            "tags": [
              "signature",
              "permissions-required",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?ctiid.258916"
          },
          {
            "name": "Submit #303451 | Clavister Clavister E80 - EagleSeries . Cross-Site Scripting",
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?submit.303451"
          },
          {
            "tags": [
              "exploit",
              "x_transferred"
            ],
            "url": "https://github.com/strik3r0x1/Vulns/blob/main/Clavister_E80-RXSS.md"
          },
          {
            "tags": [
              "related",
              "x_transferred"
            ],
            "url": "https://docs.clavister.com/repo/cos-core-release-notes/doc/index.html#d0e2260"
          },
          {
            "tags": [
              "patch",
              "x_transferred"
            ],
            "url": "https://my.clavister.com/downloads/?sid=1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Misc Settings Page"
          ],
          "product": "E10",
          "vendor": "Clavister",
          "versions": [
            {
              "status": "affected",
              "version": "14.00.0"
            },
            {
              "status": "affected",
              "version": "14.00.1"
            },
            {
              "status": "affected",
              "version": "14.00.2"
            },
            {
              "status": "affected",
              "version": "14.00.3"
            },
            {
              "status": "affected",
              "version": "14.00.4"
            },
            {
              "status": "affected",
              "version": "14.00.5"
            },
            {
              "status": "affected",
              "version": "14.00.6"
            },
            {
              "status": "affected",
              "version": "14.00.7"
            },
            {
              "status": "affected",
              "version": "14.00.8"
            },
            {
              "status": "affected",
              "version": "14.00.9"
            },
            {
              "status": "affected",
              "version": "14.00.10"
            }
          ]
        },
        {
          "modules": [
            "Misc Settings Page"
          ],
          "product": "E80",
          "vendor": "Clavister",
          "versions": [
            {
              "status": "affected",
              "version": "14.00.0"
            },
            {
              "status": "affected",
              "version": "14.00.1"
            },
            {
              "status": "affected",
              "version": "14.00.2"
            },
            {
              "status": "affected",
              "version": "14.00.3"
            },
            {
              "status": "affected",
              "version": "14.00.4"
            },
            {
              "status": "affected",
              "version": "14.00.5"
            },
            {
              "status": "affected",
              "version": "14.00.6"
            },
            {
              "status": "affected",
              "version": "14.00.7"
            },
            {
              "status": "affected",
              "version": "14.00.8"
            },
            {
              "status": "affected",
              "version": "14.00.9"
            },
            {
              "status": "affected",
              "version": "14.00.10"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Strik3r (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been found in Clavister E10 and E80 up to 14.00.10 and classified as problematic. This vulnerability affects unknown code of the file /?Page=Node\u0026OBJ=/System/AdvancedSettings/DeviceSettings/MiscSettings of the component Misc Settings Page. The manipulation of the argument WatchdogTimerTime/BufFloodRebootTime/MaxPipeUsers/AVCache Lifetime/HTTPipeliningMaxReq/Reassembly MaxConnections/Reassembly MaxProcessingMem/ScrSaveTime leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 14.00.11 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-258916."
        },
        {
          "lang": "de",
          "value": "In Clavister E10 and E80 bis 14.00.10 wurde eine problematische Schwachstelle gefunden. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei /?Page=Node\u0026OBJ=/System/AdvancedSettings/DeviceSettings/MiscSettings der Komponente Misc Settings Page. Durch das Beeinflussen des Arguments WatchdogTimerTime/BufFloodRebootTime/MaxPipeUsers/AVCache Lifetime/HTTPipeliningMaxReq/Reassembly MaxConnections/Reassembly MaxProcessingMem/ScrSaveTime mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version 14.00.11 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 3.3,
            "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Cross Site Scripting",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-04T12:44:39.966Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-258916 | Clavister E10/E80 Misc Settings Page MiscSettings cross site scripting",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.258916"
        },
        {
          "name": "VDB-258916 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.258916"
        },
        {
          "name": "Submit #303451 | Clavister Clavister E80 - EagleSeries . Cross-Site Scripting",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.303451"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/strik3r0x1/Vulns/blob/main/Clavister_E80-RXSS.md"
        },
        {
          "tags": [
            "related"
          ],
          "url": "https://docs.clavister.com/repo/cos-core-release-notes/doc/index.html#d0e2260"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://my.clavister.com/downloads/?sid=1"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2023-10-16T00:00:00.000Z",
          "value": "Countermeasure disclosed"
        },
        {
          "lang": "en",
          "time": "2024-04-01T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2024-04-01T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2024-04-04T14:49:09.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Clavister E10/E80 Misc Settings Page MiscSettings cross site scripting"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2024-3141",
    "datePublished": "2024-04-01T23:00:06.054Z",
    "dateReserved": "2024-04-01T17:49:33.202Z",
    "dateUpdated": "2025-03-12T16:41:36.487Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-8753 (GCVE-0-2018-8753)

Vulnerability from cvelistv5 – Published: 2018-08-15 18:00 – Updated: 2024-08-05 07:02
VLAI?
Summary
The IKEv1 implementation in Clavister cOS Core before 11.00.11, 11.20.xx before 11.20.06, and 12.00.xx before 12.00.09 allows remote attackers to decrypt RSA-encrypted nonces by leveraging a Bleichenbacher attack.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T07:02:26.036Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://web-in-security.blogspot.com/2018/08/practical-bleichenbacher-attacks-on-ipsec-ike.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.clavister.com/advisories/security/clav-sa-0157-bleichenbacher-oracle-vulnerability-in-ikev1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-08-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The IKEv1 implementation in Clavister cOS Core before 11.00.11, 11.20.xx before 11.20.06, and 12.00.xx before 12.00.09 allows remote attackers to decrypt RSA-encrypted nonces by leveraging a Bleichenbacher attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-08-15T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://web-in-security.blogspot.com/2018/08/practical-bleichenbacher-attacks-on-ipsec-ike.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.clavister.com/advisories/security/clav-sa-0157-bleichenbacher-oracle-vulnerability-in-ikev1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-8753",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IKEv1 implementation in Clavister cOS Core before 11.00.11, 11.20.xx before 11.20.06, and 12.00.xx before 12.00.09 allows remote attackers to decrypt RSA-encrypted nonces by leveraging a Bleichenbacher attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://web-in-security.blogspot.com/2018/08/practical-bleichenbacher-attacks-on-ipsec-ike.html",
              "refsource": "MISC",
              "url": "https://web-in-security.blogspot.com/2018/08/practical-bleichenbacher-attacks-on-ipsec-ike.html"
            },
            {
              "name": "https://www.clavister.com/advisories/security/clav-sa-0157-bleichenbacher-oracle-vulnerability-in-ikev1",
              "refsource": "CONFIRM",
              "url": "https://www.clavister.com/advisories/security/clav-sa-0157-bleichenbacher-oracle-vulnerability-in-ikev1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-8753",
    "datePublished": "2018-08-15T18:00:00",
    "dateReserved": "2018-03-17T00:00:00",
    "dateUpdated": "2024-08-05T07:02:26.036Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3805 (GCVE-0-2007-3805)

Vulnerability from cvelistv5 – Published: 2007-07-16 23:00 – Updated: 2024-08-07 14:28
VLAI?
Summary
The IKE implementation in Clavister CorePlus before 8.80.03, and 8.80.00, does not properly validate certificates during IKE negotiation, which allows remote attackers to cause a denial of service (gateway stop) via certain certificates.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:28:52.470Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf"
          },
          {
            "name": "clavister-ike-dos(35370)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35370"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf"
          },
          {
            "name": "37972",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37972"
          },
          {
            "name": "25957",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25957"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The IKE implementation in Clavister CorePlus before 8.80.03, and 8.80.00, does not properly validate certificates during IKE negotiation, which allows remote attackers to cause a denial of service (gateway stop) via certain certificates."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf"
        },
        {
          "name": "clavister-ike-dos(35370)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35370"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf"
        },
        {
          "name": "37972",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37972"
        },
        {
          "name": "25957",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25957"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3805",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IKE implementation in Clavister CorePlus before 8.80.03, and 8.80.00, does not properly validate certificates during IKE negotiation, which allows remote attackers to cause a denial of service (gateway stop) via certain certificates."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf"
            },
            {
              "name": "clavister-ike-dos(35370)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35370"
            },
            {
              "name": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf"
            },
            {
              "name": "37972",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37972"
            },
            {
              "name": "25957",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25957"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3805",
    "datePublished": "2007-07-16T23:00:00",
    "dateReserved": "2007-07-16T00:00:00",
    "dateUpdated": "2024-08-07T14:28:52.470Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3803 (GCVE-0-2007-3803)

Vulnerability from cvelistv5 – Published: 2007-07-16 23:00 – Updated: 2024-08-07 14:28
VLAI?
Summary
The SMTP ALG in Clavister CorePlus before 8.80.04, and 8.81.00, does not properly parse SMTP commands in certain circumstances, which allows remote attackers to bypass address blacklists.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:28:52.469Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf"
          },
          {
            "name": "37974",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37974"
          },
          {
            "name": "25957",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25957"
          },
          {
            "name": "clavister-smtp-security-bypass(35371)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35371"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SMTP ALG in Clavister CorePlus before 8.80.04, and 8.81.00, does not properly parse SMTP commands in certain circumstances, which allows remote attackers to bypass address blacklists."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf"
        },
        {
          "name": "37974",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37974"
        },
        {
          "name": "25957",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25957"
        },
        {
          "name": "clavister-smtp-security-bypass(35371)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35371"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3803",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SMTP ALG in Clavister CorePlus before 8.80.04, and 8.81.00, does not properly parse SMTP commands in certain circumstances, which allows remote attackers to bypass address blacklists."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf"
            },
            {
              "name": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf"
            },
            {
              "name": "37974",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37974"
            },
            {
              "name": "25957",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25957"
            },
            {
              "name": "clavister-smtp-security-bypass(35371)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35371"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3803",
    "datePublished": "2007-07-16T23:00:00",
    "dateReserved": "2007-07-16T00:00:00",
    "dateUpdated": "2024-08-07T14:28:52.469Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3804 (GCVE-0-2007-3804)

Vulnerability from cvelistv5 – Published: 2007-07-16 23:00 – Updated: 2024-08-07 14:28
VLAI?
Summary
The AntiVirus engine in the HTTP-ALG in Clavister CorePlus before 8.81.00 and 8.80.03 might allow remote attackers to bypass scanning via small files.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.clavister.com/releasenotes/CorePlus_Re… x_refsource_CONFIRM
http://www.clavister.com/releasenotes/CorePlus_Re… x_refsource_CONFIRM
http://secunia.com/advisories/25957 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/37973 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:28:52.459Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf"
          },
          {
            "name": "25957",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25957"
          },
          {
            "name": "37973",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37973"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The AntiVirus engine in the HTTP-ALG in Clavister CorePlus before 8.81.00 and 8.80.03 might allow remote attackers to bypass scanning via small files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-11-15T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf"
        },
        {
          "name": "25957",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25957"
        },
        {
          "name": "37973",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37973"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3804",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The AntiVirus engine in the HTTP-ALG in Clavister CorePlus before 8.81.00 and 8.80.03 might allow remote attackers to bypass scanning via small files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_80_04.pdf"
            },
            {
              "name": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf",
              "refsource": "CONFIRM",
              "url": "http://www.clavister.com/releasenotes/CorePlus_Release_Notes_8_81_01.pdf"
            },
            {
              "name": "25957",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25957"
            },
            {
              "name": "37973",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37973"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3804",
    "datePublished": "2007-07-16T23:00:00",
    "dateReserved": "2007-07-16T00:00:00",
    "dateUpdated": "2024-08-07T14:28:52.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-3915 (GCVE-0-2005-3915)

Vulnerability from cvelistv5 – Published: 2005-11-30 11:00 – Updated: 2024-08-07 23:31
VLAI?
Summary
The Internet Key Exchange version 1 (IKEv1) implementation in Clavister Client Web allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/17663 third-party-advisoryx_refsource_SECUNIA
http://www.clavister.com/support/support_update_I… x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2005/2566 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/15560 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:31:48.369Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17663",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17663"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.clavister.com/support/support_update_ISAKMP.html"
          },
          {
            "name": "ADV-2005-2566",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2566"
          },
          {
            "name": "15560",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15560"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-11-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Internet Key Exchange version 1 (IKEv1) implementation in Clavister Client Web allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.  NOTE: due to the lack of details in the advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17663",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17663"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.clavister.com/support/support_update_ISAKMP.html"
        },
        {
          "name": "ADV-2005-2566",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2566"
        },
        {
          "name": "15560",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15560"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3915",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Internet Key Exchange version 1 (IKEv1) implementation in Clavister Client Web allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.  NOTE: due to the lack of details in the advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17663",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17663"
            },
            {
              "name": "http://www.clavister.com/support/support_update_ISAKMP.html",
              "refsource": "CONFIRM",
              "url": "http://www.clavister.com/support/support_update_ISAKMP.html"
            },
            {
              "name": "ADV-2005-2566",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2566"
            },
            {
              "name": "15560",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15560"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3915",
    "datePublished": "2005-11-30T11:00:00",
    "dateReserved": "2005-11-30T00:00:00",
    "dateUpdated": "2024-08-07T23:31:48.369Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}