Published:2009/10/28 Last Updated:2009/11/02
JVN#06362164
SEIL/X Series and SEIL/B1 buffer overflow vulnerability
Overview
SEIL/X Series and SEIL/B1 contain a buffer overflow vulnerability.
Products Affected
- SEIL/X1 firmware 2.40 to 2.51
- SEIL/X2 firmware 2.40 to 2.51
- SEIL/B1 firmware 2.40 to 2.51
Description
SEIL/X Series and SEIL/B1 are routers. SEIL/X Series and SEIL/B1 contain an issue in the processing by the URL filtering function, which may lead to a buffer overflow vulnerability.
Impact
When processing a specially crafted URL, a remote attacker may be able to execute arbitrary code.
Solution
Update the Software
Update to the latest version according to the information provided by the developer.
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
Internet Initiative Japan Inc. | Vulnerable | 2009/10/28 |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2009.10.28
Measures | Conditions | Severity |
---|---|---|
Access Required | Routed - can be attacked over the Internet using packets |
|
Authentication | None - anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | None - the vulnerability can be exploited without an honest user taking any action |
|
Exploit Complexity | Low-Medium - some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) |
|
Credit
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory | |
CPNI Advisory | |
TRnotes | |
CVE |
CVE-2009-4292 |
JVN iPedia |
JVNDB-2009-000069 |