CVE-2012-2632
15.06.2012, 19:55
SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session.Enginsight
Vendor | Product | Version |
---|---|---|
seil | b1 | 2.30 |
seil | b1 | 2.40 |
seil | b1 | 2.41 |
seil | b1 | 2.42 |
seil | b1 | 2.50 |
seil | b1 | 2.51 |
seil | b1 | 2.52 |
seil | b1 | 2.60 |
seil | b1 | 2.61 |
seil | b1 | 2.62 |
seil | b1 | 2.63 |
seil | b1 | 2.70 |
seil | b1 | 2.72 |
seil | b1 | 2.73 |
seil | b1 | 2.74 |
seil | b1 | 2.75 |
seil | b1 | 3.01 |
seil | b1 | 3.02 |
seil | b1 | 3.10 |
seil | b1 | 3.11 |
seil | b1 | 3.12 |
seil | b1 | 3.13 |
seil | b1 | 3.20 |
seil | b1 | 3.21 |
seil | b1 | 3.30 |
seil | b1 | 3.31 |
seil | b1 | 3.40 |
seil | b1 | 3.41 |
seil | b1 | 3.50 |
seil | b1 | 3.51 |
seil | b1 | 3.60 |
seil | b1 | 3.70 |
seil | b1 | 3.71 |
seil | b1 | 3.75 |
seil | x1 | 2.30 |
seil | x1 | 2.40 |
seil | x1 | 2.41 |
seil | x1 | 2.42 |
seil | x1 | 2.50 |
seil | x1 | 2.51 |
seil | x1 | 2.52 |
seil | x1 | 2.60 |
seil | x1 | 2.61 |
seil | x1 | 2.62 |
seil | x1 | 2.63 |
seil | x1 | 2.70 |
seil | x1 | 2.72 |
seil | x1 | 2.73 |
seil | x1 | 2.74 |
seil | x1 | 2.75 |
seil | x1 | 3.01 |
seil | x1 | 3.02 |
seil | x1 | 3.10 |
seil | x1 | 3.11 |
seil | x1 | 3.12 |
seil | x1 | 3.13 |
seil | x1 | 3.20 |
seil | x1 | 3.21 |
seil | x1 | 3.30 |
seil | x1 | 3.31 |
seil | x1 | 3.40 |
seil | x1 | 3.41 |
seil | x1 | 3.50 |
seil | x1 | 3.51 |
seil | x1 | 3.60 |
seil | x1 | 3.70 |
seil | x1 | 3.71 |
seil | x1 | 3.75 |
seil | x2 | 2.30 |
seil | x2 | 2.40 |
seil | x2 | 2.41 |
seil | x2 | 2.42 |
seil | x2 | 2.50 |
seil | x2 | 2.51 |
seil | x2 | 2.52 |
seil | x2 | 2.60 |
seil | x2 | 2.61 |
seil | x2 | 2.62 |
seil | x2 | 2.63 |
seil | x2 | 2.70 |
seil | x2 | 2.72 |
seil | x2 | 2.73 |
seil | x2 | 2.74 |
seil | x2 | 2.75 |
seil | x2 | 3.01 |
seil | x2 | 3.02 |
seil | x2 | 3.10 |
seil | x2 | 3.11 |
seil | x2 | 3.12 |
seil | x2 | 3.13 |
seil | x2 | 3.20 |
seil | x2 | 3.21 |
seil | x2 | 3.30 |
seil | x2 | 3.31 |
seil | x2 | 3.40 |
seil | x2 | 3.41 |
seil | x2 | 3.50 |
seil | x2 | 3.51 |
seil | x2 | 3.60 |
seil | x2 | 3.70 |
seil | x2 | 3.71 |
seil | x2 | 3.75 |
seil | b1_firmware | 2.30 |
seil | b1_firmware | 2.40 |
seil | b1_firmware | 2.41 |
seil | b1_firmware | 2.42 |
seil | b1_firmware | 2.50 |
seil | b1_firmware | 2.51 |
seil | b1_firmware | 2.52 |
seil | b1_firmware | 2.60 |
seil | b1_firmware | 2.61 |
seil | b1_firmware | 2.62 |
seil | b1_firmware | 2.63 |
seil | b1_firmware | 2.70 |
seil | b1_firmware | 2.72 |
seil | b1_firmware | 2.73 |
seil | b1_firmware | 2.74 |
seil | b1_firmware | 2.75 |
seil | b1_firmware | 3.01 |
seil | b1_firmware | 3.02 |
seil | b1_firmware | 3.10 |
seil | b1_firmware | 3.11 |
seil | b1_firmware | 3.12 |
seil | b1_firmware | 3.13 |
seil | b1_firmware | 3.20 |
seil | b1_firmware | 3.21 |
seil | b1_firmware | 3.30 |
seil | b1_firmware | 3.31 |
seil | b1_firmware | 3.40 |
seil | b1_firmware | 3.41 |
seil | b1_firmware | 3.50 |
seil | b1_firmware | 3.51 |
seil | b1_firmware | 3.60 |
seil | b1_firmware | 3.70 |
seil | b1_firmware | 3.71 |
seil | b1_firmware | 3.75 |
seil | x86_firmware | 1.00 |
seil | x86_firmware | 1.61 |
𝑥
= Vulnerable software versions