Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:infradead:openconnect:*:*:*:*:*:*:*:*", "matchCriteriaId": "09280E19-A1F1-487B-80FC-EA35E0F1E8EF", "versionEndIncluding": "3.17", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "67DF6A41-F66A-4988-8852-08B0F8409185", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "13B5B9C7-3D91-4A40-BEE2-F1BEF2857C4F", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:1.20:*:*:*:*:*:*:*", "matchCriteriaId": "DFF4C32E-4053-4968-B2E7-C821908B3017", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:1.30:*:*:*:*:*:*:*", "matchCriteriaId": "92A36920-3A90-4369-A8F4-515C423BE938", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:1.40:*:*:*:*:*:*:*", "matchCriteriaId": "7B7D9D50-9787-453E-8AB8-7B46F8689875", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:2.00:*:*:*:*:*:*:*", "matchCriteriaId": "6796B9D9-A95C-48BF-A1A9-256DD03C9AAA", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "61634238-AF09-497B-8FF1-267C46C8546D", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:2.10:*:*:*:*:*:*:*", "matchCriteriaId": "C65C84C3-C747-4AF0-8650-EA15EB032B9B", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:2.11:*:*:*:*:*:*:*", "matchCriteriaId": "012C702A-942D-457A-91AB-A3743CE291FB", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "26BC396E-21AA-4914-B014-C338337E3F70", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:2.20:*:*:*:*:*:*:*", "matchCriteriaId": "BB4D50E9-1318-4A74-B58B-0BE2A8B9A0DC", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:2.21:*:*:*:*:*:*:*", "matchCriteriaId": "EC648F46-ED89-4C52-A75B-784D98644DBB", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:2.22:*:*:*:*:*:*:*", "matchCriteriaId": "D3192A04-7811-4688-BF1E-4B6FA91D83D5", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:2.23:*:*:*:*:*:*:*", "matchCriteriaId": "9A70F780-4F80-4150-BF5A-3987FD2F63E7", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:2.24:*:*:*:*:*:*:*", "matchCriteriaId": "1F9C36A8-FCED-4295-AF6F-114117BB5E27", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:2.25:*:*:*:*:*:*:*", "matchCriteriaId": "B81DAC11-043F-4E61-ADEA-F344A30E9678", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:2.26:*:*:*:*:*:*:*", "matchCriteriaId": "1237675E-A9BF-4736-843C-BAE4BC1E5287", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:3.00:*:*:*:*:*:*:*", "matchCriteriaId": "C6CAF5FF-D235-4076-8C53-178046DB1E21", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:3.01:*:*:*:*:*:*:*", "matchCriteriaId": "BE004D4A-7828-434E-BC3B-5F2E4BADBB5C", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:3.02:*:*:*:*:*:*:*", "matchCriteriaId": "CF998695-F365-434B-9CC2-D38E19205841", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "95067CF5-60DD-4894-B9E8-16C172A95AA2", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "7F7A59FD-13B7-4B25-9405-01BEC30CF92A", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:3.13:*:*:*:*:*:*:*", "matchCriteriaId": "8CA3D950-359A-430F-908A-2C73B7EBFE93", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:3.14:*:*:*:*:*:*:*", "matchCriteriaId": "A87AF2BB-F322-405A-A9DD-912187C84230", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:3.15:*:*:*:*:*:*:*", "matchCriteriaId": "D987F0E3-1072-476A-BEA7-7590D2B9BFFB", "vulnerable": true}, {"criteria": "cpe:2.3:a:infradead:openconnect:3.16:*:*:*:*:*:*:*", "matchCriteriaId": "7CFF9035-206F-4AF1-8B46-30265EC056A4", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner."}, {"lang": "es", "value": "Un desbordamiento de buffer basado en memoria din\u00e1mica en OpenConnect v3.18 permite a los servidores remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de un \"banner\" de saludo espec\u00edficamente modificado."}], "id": "CVE-2012-3291", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-06-07T20:55:02.057", "references": [{"source": "cve@mitre.org", "url": "http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2"}, {"source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079747.html"}, {"source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00186.html"}, {"source": "cve@mitre.org", "url": "http://www.debian.org/security/2012/dsa-2495"}, {"source": "cve@mitre.org", "url": "http://www.infradead.org/openconnect/changelog.html"}, {"source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17242"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079747.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00186.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2495"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.infradead.org/openconnect/changelog.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17242"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}