CVE-2012-0133 (GCVE-0-2012-0133)
Vulnerability from cvelistv5 – Published: 2012-04-12 10:00 – Updated: 2024-08-06 18:16
VLAI?
Summary
HP ProCurve 5400 zl switches with certain serial numbers include a compact flash card that contains an unspecified virus, which might allow user-assisted remote attackers to execute arbitrary code on a PC by leveraging manual transfer of this card.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:16:18.864Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "SSRT100803",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/522288"
},
{
"name": "hpprocurve-flashcards-weak-security(74819)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74819"
},
{
"name": "48738",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48738"
},
{
"name": "HPSBPV02754",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/522288"
},
{
"name": "1026916",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1026916"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-04-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "HP ProCurve 5400 zl switches with certain serial numbers include a compact flash card that contains an unspecified virus, which might allow user-assisted remote attackers to execute arbitrary code on a PC by leveraging manual transfer of this card."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"name": "SSRT100803",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://www.securityfocus.com/archive/1/522288"
},
{
"name": "hpprocurve-flashcards-weak-security(74819)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74819"
},
{
"name": "48738",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48738"
},
{
"name": "HPSBPV02754",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://www.securityfocus.com/archive/1/522288"
},
{
"name": "1026916",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1026916"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2012-0133",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "HP ProCurve 5400 zl switches with certain serial numbers include a compact flash card that contains an unspecified virus, which might allow user-assisted remote attackers to execute arbitrary code on a PC by leveraging manual transfer of this card."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "SSRT100803",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/522288"
},
{
"name": "hpprocurve-flashcards-weak-security(74819)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74819"
},
{
"name": "48738",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48738"
},
{
"name": "HPSBPV02754",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/522288"
},
{
"name": "1026916",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026916"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2012-0133",
"datePublished": "2012-04-12T10:00:00",
"dateReserved": "2011-12-13T00:00:00",
"dateUpdated": "2024-08-06T18:16:18.864Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2012-0133\",\"sourceIdentifier\":\"hp-security-alert@hp.com\",\"published\":\"2012-04-12T10:45:14.080\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"HP ProCurve 5400 zl switches with certain serial numbers include a compact flash card that contains an unspecified virus, which might allow user-assisted remote attackers to execute arbitrary code on a PC by leveraging manual transfer of this card.\"},{\"lang\":\"es\",\"value\":\"Los conmutadores HP ProCurve 5400 zl con determinados n\u00fameros de serie incluyen una tarjeta compact flash que contiene un virus no especificado, lo que podr\u00eda permitir ejecutar c\u00f3digo su elecci\u00f3n en un PC a atacantes remotos con la ayuda de usuarios locales aprovechandose del uso de esta tarjeta en el PC.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":3.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":1.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5400zl:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D027BD-F310-44EF-B2C3-A25A5C9F8E38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5400zl_management_module:id116as0hr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F51C552E-25B0-4A6E-A769-D8B8B8004089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5400zl_management_module:id116as04p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5022A49-82BF-435F-B175-E29FF220D096\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5400zl_management_module:id117as00h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85C80219-4352-4857-B10F-ECE7C4F4F128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5400zl_management_module:id126as0fb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1CB5253-34B5-4448-A901-EA53EE9C4A10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5406-44g-poe\\\\+-4sfpzl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F341FC-8ACA-46E3-A635-9AE32B1D4350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5406-48gzl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12831652-3965-40EC-A260-C656CD26C678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5406zl-44g-poe\\\\+\\\\/2xg_sfp\\\\+_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F80871-1991-4219-8815-3640285A498F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5406zl-44g-poe\\\\+\\\\/4g_sfp\\\\+_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A3C2B52-C239-4364-B49B-ADA639463D13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5412-92g-poe\\\\+-4sfpzl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DECA7752-6052-419B-8E2E-B33A401438DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5412-96gzl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B6CF8B3-A848-4F96-99AC-9091F5ABCF38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5412zl-92g-poe\\\\+\\\\/4g_sfp\\\\+_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3232563B-E24A-411C-AFFC-894F41927A61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5412zl-92gg-poe\\\\+\\\\/2xg_sfp\\\\+_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16DB16C3-D335-46A7-96EB-307A4C685A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_chassis_e5406zl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D26729B5-FD71-4372-B8B6-B4DA195A6204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_chassis_e5412zl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD02E036-D78A-40F3-915A-7713EECEFFEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_e5406zl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65A4229A-58D8-47A2-99DF-4348DE3D63ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_e5412zl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9528C0B5-2849-41E4-87F3-5063DE5F4755\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/48738\",\"source\":\"hp-security-alert@hp.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/522288\",\"source\":\"hp-security-alert@hp.com\"},{\"url\":\"http://www.securitytracker.com/id?1026916\",\"source\":\"hp-security-alert@hp.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/74819\",\"source\":\"hp-security-alert@hp.com\"},{\"url\":\"http://secunia.com/advisories/48738\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/522288\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1026916\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/74819\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…