NVD Vulnerability Detail
Search Exploit, PoC
CVE-2011-0454
Summary

Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.

Publication Date March 2, 2011, 8 a.m.
Registration Date Jan. 28, 2021, 4:37 p.m.
Last Update Nov. 21, 2024, 10:24 a.m.
CVSS2.0 : HIGH
Score 8.3
Vector AV:A/AC:L/Au:N/C:C/I:C/A:C
攻撃元区分(AV) 隣接
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required いいえ
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:iij:seil\/b1_firmware:1.00:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.01:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.10:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.20:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.30:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.40:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.41:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.42:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.50:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.51:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.52:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.60:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.61:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.62:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.63:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.70:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.72:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.73:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.74:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:2.75:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:3.01:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:3.02:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:3.10:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/b1_firmware:3.11:*:*:*:*:*:*:*
cpe:2.3:h:iij:seil\/b1:*:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:a:iij:seil\/x1_firmware:1.00:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:1.10:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:1.11:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:1.20:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:1.21:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:1.22:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:1.30:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:1.31:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:1.32:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:1.40:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:1.41:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:1.43:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:1.44:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.10:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.20:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.30:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.40:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.41:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.42:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.50:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.51:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.52:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.60:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.61:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.62:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.63:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.70:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.72:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.73:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.74:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:2.75:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:3.01:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:3.02:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:3.10:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x1_firmware:3.11:*:*:*:*:*:*:*
cpe:2.3:h:iij:seil\/x1:*:*:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:a:iij:seil\/x2_firmware:1.00:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:1.10:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:1.11:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:1.20:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:1.21:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:1.22:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:1.30:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:1.31:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:1.32:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:1.40:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:1.41:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:1.43:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:1.44:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.10:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.20:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.30:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.40:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.41:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.42:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.50:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.51:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.52:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.60:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.61:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.62:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.63:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.70:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.72:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.73:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.74:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:2.75:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:3.01:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:3.02:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:3.10:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x2_firmware:3.11:*:*:*:*:*:*:*
cpe:2.3:h:iij:seil\/x2:*:*:*:*:*:*:*:*
Configuration4 or higher or less more than less than
cpe:2.3:a:iij:seil\/x86_firmware:1.00:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/x86_firmware:1.61:*:*:*:*:*:*:*
cpe:2.3:h:iij:seil\/x86:*:*:*:*:*:*:*:*
Configuration5 or higher or less more than less than
cpe:2.3:a:iij:seil\/turbo_firmware:1.80:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:1.81:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:1.82:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:1.83:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:1.84:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:1.85:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:1.90:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:1.91:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:1.92:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:1.93:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:1.94:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:1.95:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:1.96:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:1.98:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:1.99:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:2.00:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:2.01:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:2.02:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:2.03:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:2.04:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:2.05:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:2.06:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:2.07:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:2.08:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:2.09:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/turbo_firmware:2.10:*:*:*:*:*:*:*
cpe:2.3:h:iij:seil\/turbo:*:*:*:*:*:*:*:*
Configuration6 or higher or less more than less than
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.81:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.82:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.83:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.84:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.85:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.90:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.91:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.92:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.93:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.94:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.95:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.96:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.98:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:1.99:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:2.00:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:2.01:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:2.02:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:2.03:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:2.04:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:2.06:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:2.07:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:2.08:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:2.09:*:*:*:*:*:*:*
cpe:2.3:a:iij:seil\/neu_2fe_plus_firmware:2.10:*:*:*:*:*:*:*
cpe:2.3:h:iij:seil\/neu_2fe_plus:*:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
SEIL シリーズにおけるバッファオーバーフローの脆弱性
Title SEIL シリーズにおけるバッファオーバーフローの脆弱性
Summary

SEIL シリーズには、バッファオーバーフローの脆弱性が存在します。 SEIL シリーズは、ルータ製品です。SEIL シリーズの PPP アクセスコンセントレータ (PPPAC) 機能には PPPoE パケットの受信処理に起因するバッファオーバーフローの脆弱性が存在します。

Possible impacts 該当製品へアクセス可能な第三者によって任意のコードを実行される可能性があります。  なお、開発者によると SEIL/x86 全バージョン、SEIL/B1、SEIL/X1、SEIL/X2 3.00 から 3.11 まででは、PPPoE パケットの受信処理が非特権モードで実行されるため、本脆弱性の影響は PPPAC 機能の停止などに限られるとのことです。
Solution

[アップデートする] 開発者が提供する情報をもとに最新版へアップデートしてください。 なお、本脆弱性は以下のバージョンで修正されています。 ・SEIL/x86 ファームウェア 1.62 ・SEIL/B1 ファームウェア 3.12 ・SEIL/neu 2FE Plus ファームウェア 2.11 ・SEIL/Turbo ファームウェア 2.11 ・SEIL/X1 ファームウェア 3.12 ・SEIL/X2 ファームウェア 3.12

Publication Date Feb. 28, 2011, midnight
Registration Date Feb. 28, 2011, 12:08 p.m.
Last Update Feb. 28, 2011, 12:08 p.m.
Affected System
インターネットイニシアティブ
SEIL/B1 ファームウェア 1.00 から 3.11 まで
SEIL/neu 2FE Plus ファームウェア 1.80 から 2.10 まで
SEIL/Turbo ファームウェア 1.80 から 2.10 まで
SEIL/X1 ファームウェア 1.00 から 3.11 まで
SEIL/X2 ファームウェア 1.00 から 3.11 まで
SEIL/x86 ファームウェア 1.00 から 1.61 まで
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
0 [2011年02月28日]
  掲載
Feb. 17, 2018, 10:37 a.m.