lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <OF9D78D263.BF633E05-ON48257D58.004DD4D8-48257D58.004DD4E0@ph.ibm.com>
Date: Fri, 19 Sep 2014 22:10:07 +0800
From: Federick Joe P Fajardo <fjpfajardo@...ibm.com>
To: bugtraq@...urityfocus.com
Subject: Re: Multiple Vulnerabilities with Aztech Modem Routers

The following CVE's have been assigned for this issues:

CVE-2014-6435 - Potential DoS attack 
Link to OSVDB ID: 111432 - http://osvdb.org/show/osvdb/111432

CVE-2014-6436 - Broken Session Management
Link to OSVDB ID: 111433 - http://osvdb.org/show/osvdb/111433

CVE-2014-6437 - File and Data Exposure
Link to OSVDB ID: 111434 - http://osvdb.org/show/osvdb/111434
Link to OSVDB ID: 111435 - http://osvdb.org/show/osvdb/111435

09/01/2014 - Notified vendor. No response.
09/12/2014 - Reported to Mitre
09/14/2014 - Initial public announcement.
09/19/2014 - CVE reservation.
09/19/2014 - Resend full-disclosure to vendor, awaiting response.

Complete reference: http://x.arpa.ph/fjpf/aztech.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ