CVE-2012-0133 (GCVE-0-2012-0133)

Vulnerability from cvelistv5 – Published: 2012-04-12 10:00 – Updated: 2024-08-06 18:16
VLAI?
Summary
HP ProCurve 5400 zl switches with certain serial numbers include a compact flash card that contains an unspecified virus, which might allow user-assisted remote attackers to execute arbitrary code on a PC by leveraging manual transfer of this card.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
hp
References
http://www.securityfocus.com/archive/1/522288 vendor-advisoryx_refsource_HP
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/48738 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/522288 vendor-advisoryx_refsource_HP
http://www.securitytracker.com/id?1026916 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:18.864Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SSRT100803",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/522288"
          },
          {
            "name": "hpprocurve-flashcards-weak-security(74819)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74819"
          },
          {
            "name": "48738",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48738"
          },
          {
            "name": "HPSBPV02754",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/522288"
          },
          {
            "name": "1026916",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026916"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "HP ProCurve 5400 zl switches with certain serial numbers include a compact flash card that contains an unspecified virus, which might allow user-assisted remote attackers to execute arbitrary code on a PC by leveraging manual transfer of this card."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
        "shortName": "hp"
      },
      "references": [
        {
          "name": "SSRT100803",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/archive/1/522288"
        },
        {
          "name": "hpprocurve-flashcards-weak-security(74819)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74819"
        },
        {
          "name": "48738",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48738"
        },
        {
          "name": "HPSBPV02754",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/archive/1/522288"
        },
        {
          "name": "1026916",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026916"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "hp-security-alert@hp.com",
          "ID": "CVE-2012-0133",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "HP ProCurve 5400 zl switches with certain serial numbers include a compact flash card that contains an unspecified virus, which might allow user-assisted remote attackers to execute arbitrary code on a PC by leveraging manual transfer of this card."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SSRT100803",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/archive/1/522288"
            },
            {
              "name": "hpprocurve-flashcards-weak-security(74819)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74819"
            },
            {
              "name": "48738",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48738"
            },
            {
              "name": "HPSBPV02754",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/archive/1/522288"
            },
            {
              "name": "1026916",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026916"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
    "assignerShortName": "hp",
    "cveId": "CVE-2012-0133",
    "datePublished": "2012-04-12T10:00:00",
    "dateReserved": "2011-12-13T00:00:00",
    "dateUpdated": "2024-08-06T18:16:18.864Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-0133\",\"sourceIdentifier\":\"hp-security-alert@hp.com\",\"published\":\"2012-04-12T10:45:14.080\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"HP ProCurve 5400 zl switches with certain serial numbers include a compact flash card that contains an unspecified virus, which might allow user-assisted remote attackers to execute arbitrary code on a PC by leveraging manual transfer of this card.\"},{\"lang\":\"es\",\"value\":\"Los conmutadores HP ProCurve 5400 zl con determinados n\u00fameros de serie incluyen una tarjeta compact flash que contiene un virus no especificado, lo que podr\u00eda permitir ejecutar c\u00f3digo su elecci\u00f3n en un PC a atacantes remotos con la ayuda de usuarios locales aprovechandose del uso de esta tarjeta en el PC.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":3.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":1.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5400zl:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D027BD-F310-44EF-B2C3-A25A5C9F8E38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5400zl_management_module:id116as0hr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F51C552E-25B0-4A6E-A769-D8B8B8004089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5400zl_management_module:id116as04p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5022A49-82BF-435F-B175-E29FF220D096\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5400zl_management_module:id117as00h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85C80219-4352-4857-B10F-ECE7C4F4F128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5400zl_management_module:id126as0fb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1CB5253-34B5-4448-A901-EA53EE9C4A10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5406-44g-poe\\\\+-4sfpzl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F341FC-8ACA-46E3-A635-9AE32B1D4350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5406-48gzl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12831652-3965-40EC-A260-C656CD26C678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5406zl-44g-poe\\\\+\\\\/2xg_sfp\\\\+_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F80871-1991-4219-8815-3640285A498F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5406zl-44g-poe\\\\+\\\\/4g_sfp\\\\+_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A3C2B52-C239-4364-B49B-ADA639463D13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5412-92g-poe\\\\+-4sfpzl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DECA7752-6052-419B-8E2E-B33A401438DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5412-96gzl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B6CF8B3-A848-4F96-99AC-9091F5ABCF38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5412zl-92g-poe\\\\+\\\\/4g_sfp\\\\+_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3232563B-E24A-411C-AFFC-894F41927A61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_5412zl-92gg-poe\\\\+\\\\/2xg_sfp\\\\+_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16DB16C3-D335-46A7-96EB-307A4C685A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_chassis_e5406zl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D26729B5-FD71-4372-B8B6-B4DA195A6204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_chassis_e5412zl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD02E036-D78A-40F3-915A-7713EECEFFEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_e5406zl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65A4229A-58D8-47A2-99DF-4348DE3D63ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:procurve_switch_e5412zl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9528C0B5-2849-41E4-87F3-5063DE5F4755\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/48738\",\"source\":\"hp-security-alert@hp.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/522288\",\"source\":\"hp-security-alert@hp.com\"},{\"url\":\"http://www.securitytracker.com/id?1026916\",\"source\":\"hp-security-alert@hp.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/74819\",\"source\":\"hp-security-alert@hp.com\"},{\"url\":\"http://secunia.com/advisories/48738\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/522288\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1026916\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/74819\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…