Vulnerabilites related to rockwellautomation - factorytalk
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
rockwellautomation | factorytalk | cpr9 | |
rockwellautomation | factorytalk | cpr9_sr5 | |
rockwellautomation | rslogix_5000 | 17 | |
rockwellautomation | rslogix_5000 | 18 | |
rockwellautomation | rslogix_5000 | 19 | |
rockwellautomation | rslogix_5000 | 20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockwellautomation:factorytalk:cpr9:*:*:*:*:*:*:*", "matchCriteriaId": "A4CDEE93-7510-44B2-9C6F-57D896F2BDCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:rockwellautomation:factorytalk:cpr9_sr5:*:*:*:*:*:*:*", "matchCriteriaId": "D3288C19-0AA1-45AC-A224-0483587645E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rockwellautomation:rslogix_5000:17:*:*:*:*:*:*:*", "matchCriteriaId": "A3E1F2B5-8BD1-49DF-AEF1-8E4B47C8F5E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rockwellautomation:rslogix_5000:18:*:*:*:*:*:*:*", "matchCriteriaId": "C4165EAF-CA42-4A8D-BE59-275DFB21EA80", "vulnerable": true }, { "criteria": "cpe:2.3:a:rockwellautomation:rslogix_5000:19:*:*:*:*:*:*:*", "matchCriteriaId": "D1D65EF8-F725-4250-9319-08B6625928ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:rockwellautomation:rslogix_5000:20:*:*:*:*:*:*:*", "matchCriteriaId": "E984E344-7B3A-4A0A-96A9-D2C2E4802ECA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted packet." }, { "lang": "es", "value": "El servicio FactoryTalk (FT) RNADiagReceiver en Rockwell Automation Allen-Bradley FactoryTalk CPR9 hasta SR5 y RSLogix 5000 17 hasta 20 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (lectura fuera del l\u00edmite) a trav\u00e9s de un paquete manipulado." } ], "id": "CVE-2012-0222", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-04-02T18:55:01.090", "references": [ { "source": "cret@cert.org", "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
rockwellautomation | factorytalk | cpr9 | |
rockwellautomation | factorytalk | cpr9_sr5 | |
rockwellautomation | rslogix_5000 | 17 | |
rockwellautomation | rslogix_5000 | 18 | |
rockwellautomation | rslogix_5000 | 19 | |
rockwellautomation | rslogix_5000 | 20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockwellautomation:factorytalk:cpr9:*:*:*:*:*:*:*", "matchCriteriaId": "A4CDEE93-7510-44B2-9C6F-57D896F2BDCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:rockwellautomation:factorytalk:cpr9_sr5:*:*:*:*:*:*:*", "matchCriteriaId": "D3288C19-0AA1-45AC-A224-0483587645E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rockwellautomation:rslogix_5000:17:*:*:*:*:*:*:*", "matchCriteriaId": "A3E1F2B5-8BD1-49DF-AEF1-8E4B47C8F5E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rockwellautomation:rslogix_5000:18:*:*:*:*:*:*:*", "matchCriteriaId": "C4165EAF-CA42-4A8D-BE59-275DFB21EA80", "vulnerable": true }, { "criteria": "cpe:2.3:a:rockwellautomation:rslogix_5000:19:*:*:*:*:*:*:*", "matchCriteriaId": "D1D65EF8-F725-4250-9319-08B6625928ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:rockwellautomation:rslogix_5000:20:*:*:*:*:*:*:*", "matchCriteriaId": "E984E344-7B3A-4A0A-96A9-D2C2E4802ECA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 does not properly handle the return value from an unspecified function, which allows remote attackers to cause a denial of service (service outage) via a crafted packet." }, { "lang": "es", "value": "El servicio FactoryTalk (FT) RNADiagReceiver en Rockwell Automation Allen-Bradley FactoryTalk CPR9 hasta SR5 y RSLogix 5000 17 hasta 20 no gestiona de forma adecuada el valor de retorno de una funci\u00f3n espec\u00edfica, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corte de servicio) a trav\u00e9s de un paquete manipulado." } ], "id": "CVE-2012-0221", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-04-02T18:55:01.043", "references": [ { "source": "cret@cert.org", "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2012-0221 (GCVE-0-2012-0221)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937 | x_refsource_MISC | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:19.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 does not properly handle the return value from an unspecified function, which allows remote attackers to cause a denial of service (service outage) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-04-02T18:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-0221", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 does not properly handle the return value from an unspecified function, which allows remote attackers to cause a denial of service (service outage) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937", "refsource": "MISC", "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-0221", "datePublished": "2012-04-02T18:00:00Z", "dateReserved": "2011-12-21T00:00:00Z", "dateUpdated": "2024-09-17T01:11:29.822Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0222 (GCVE-0-2012-0222)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937 | x_refsource_MISC | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:19.673Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-04-02T18:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-0222", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937", "refsource": "MISC", "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-0222", "datePublished": "2012-04-02T18:00:00Z", "dateReserved": "2011-12-21T00:00:00Z", "dateUpdated": "2024-09-16T19:50:52.879Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201204-0173
Vulnerability from variot
The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 does not properly handle the return value from an unspecified function, which allows remote attackers to cause a denial of service (service outage) via a crafted packet. Rockwell Automation is a provider of industrial automation, control and information technology solutions. Rockwell Automation FactoryTalk Activation Server RNADiagReceiver has errors in processing packets. Submitting a packet containing more than 2000 bytes to UDP port 4445 can result in no subsequent connections. An attacker can exploit these issues to crash the affected application, denying service to legitimate users
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201204-0173", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "automation factorytalk activation server", "scope": "eq", "trust": 1.7, "vendor": "rockwall", "version": "3.2" }, { "model": "automation rslogix", "scope": "eq", "trust": 1.7, "vendor": "rockwall", "version": "500019" }, { "model": "factorytalk", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "cpr9" }, { "model": "rslogix 5000", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "18" }, { "model": "rslogix 5000", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "20" }, { "model": "rslogix 5000", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "17" }, { "model": "factorytalk", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "cpr9_sr5" }, { "model": "rslogix 5000", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "19" }, { "model": "automation rslogix", "scope": "eq", "trust": 1.5, "vendor": "rockwall", "version": "500018" }, { "model": "automation rslogix", "scope": "eq", "trust": 1.5, "vendor": "rockwall", "version": "500017" }, { "model": "factorytalk", "scope": "eq", "trust": 0.8, "vendor": "rockwell automation", "version": "cpr9 to sr5" }, { "model": "rslogix 5000", "scope": "eq", "trust": 0.8, "vendor": "rockwell automation", "version": "17 to 20" }, { "model": null, "scope": null, "trust": 0.6, "vendor": "no", "version": null }, { "model": "cpr9", "scope": null, "trust": 0.4, "vendor": "factorytalk", "version": null }, { "model": "cpr9 sr5", "scope": null, "trust": 0.4, "vendor": "factorytalk", "version": null }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "rslogix 5000", "version": "17" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "rslogix 5000", "version": "18" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "rslogix 5000", "version": "19" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "rslogix 5000", "version": "20" }, { "model": "automation rslogix", "scope": "eq", "trust": 0.4, "vendor": "rockwall", "version": "500018*" }, { "model": "automation rslogix", "scope": "eq", "trust": 0.4, "vendor": "rockwall", "version": "500017*" }, { "model": "automation factorytalk cpr9-sr5", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9-sr4", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9-sr3", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9-sr2", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9-sr1", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk", "scope": "eq", "trust": 0.3, "vendor": "rockwall", "version": "0" }, { "model": "automation rslogix", "scope": "eq", "trust": 0.2, "vendor": "rockwall", "version": "500019*" }, { "model": "automation factorytalk activation server", "scope": "eq", "trust": 0.2, "vendor": "rockwall", "version": "3.2*" } ], "sources": [ { "db": "IVD", "id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1" }, { "db": "IVD", "id": "fa04ef80-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ef44ea94-1f77-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "f0999908-1f77-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8875" }, { "db": "BID", "id": "51444" }, { "db": "JVNDB", "id": "JVNDB-2012-001982" }, { "db": "CNNVD", "id": "CNNVD-201204-003" }, { "db": "NVD", "id": "CVE-2012-0221" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:rockwellautomation:factorytalk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:rockwellautomation:rslogix_5000", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001982" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma", "sources": [ { "db": "BID", "id": "51444" }, { "db": "CNNVD", "id": "CNNVD-201201-287" } ], "trust": 0.9 }, "cve": "CVE-2012-0221", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2012-0221", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2012-8875", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "fa04ef80-2353-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "ef44ea94-1f77-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "f0999908-1f77-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-53502", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-0221", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-0221", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2012-8875", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201204-003", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "fa04ef80-2353-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "ef44ea94-1f77-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "f0999908-1f77-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-53502", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1" }, { "db": "IVD", "id": "fa04ef80-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ef44ea94-1f77-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "f0999908-1f77-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-8875" }, { "db": "VULHUB", "id": "VHN-53502" }, { "db": "JVNDB", "id": "JVNDB-2012-001982" }, { "db": "CNNVD", "id": "CNNVD-201204-003" }, { "db": "NVD", "id": "CVE-2012-0221" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 does not properly handle the return value from an unspecified function, which allows remote attackers to cause a denial of service (service outage) via a crafted packet. Rockwell Automation is a provider of industrial automation, control and information technology solutions. Rockwell Automation FactoryTalk Activation Server RNADiagReceiver has errors in processing packets. Submitting a packet containing more than 2000 bytes to UDP port 4445 can result in no subsequent connections. \nAn attacker can exploit these issues to crash the affected application, denying service to legitimate users", "sources": [ { "db": "NVD", "id": "CVE-2012-0221" }, { "db": "JVNDB", "id": "JVNDB-2012-001982" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8875" }, { "db": "BID", "id": "51444" }, { "db": "IVD", "id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1" }, { "db": "IVD", "id": "fa04ef80-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ef44ea94-1f77-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "f0999908-1f77-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-53502" } ], "trust": 4.32 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-53502", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-53502" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-0221", "trust": 4.2 }, { "db": "ICS CERT", "id": "ICSA-12-088-01", "trust": 3.4 }, { "db": "BID", "id": "51444", "trust": 2.1 }, { "db": "CNNVD", "id": "CNNVD-201204-003", "trust": 1.5 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-12-017-01", "trust": 1.1 }, { "db": "CNVD", "id": "CNVD-2012-8875", "trust": 1.0 }, { "db": "CNVD", "id": "CNVD-2012-0190", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2012-0189", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-001982", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201201-287", "trust": 0.6 }, { "db": "IVD", "id": "7D70A8CF-463F-11E9-B5ED-000C29342CB1", "trust": 0.2 }, { "db": "IVD", "id": "FA04EF80-2353-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "EF44EA94-1F77-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "F0999908-1F77-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-72115", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "36570", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-53502", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1" }, { "db": "IVD", "id": "fa04ef80-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ef44ea94-1f77-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "f0999908-1f77-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8875" }, { "db": "VULHUB", "id": "VHN-53502" }, { "db": "BID", "id": "51444" }, { "db": "JVNDB", "id": "JVNDB-2012-001982" }, { "db": "CNNVD", "id": "CNNVD-201201-287" }, { "db": "CNNVD", "id": "CNNVD-201204-003" }, { "db": "NVD", "id": "CVE-2012-0221" } ] }, "id": "VAR-201204-0173", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1" }, { "db": "IVD", "id": "fa04ef80-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ef44ea94-1f77-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "f0999908-1f77-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8875" }, { "db": "VULHUB", "id": "VHN-53502" } ], "trust": 3.5250000000000004 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 2.6 } ], "sources": [ { "db": "IVD", "id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1" }, { "db": "IVD", "id": "fa04ef80-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ef44ea94-1f77-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "f0999908-1f77-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8875" } ] }, "last_update_date": "2024-11-23T22:08:50.890000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RSLogix 5000", "trust": 0.8, "url": "http://www.rockwellautomation.com/rockwellsoftware/design/rslogix5000/" }, { "title": "FactoryTalk", "trust": 0.8, "url": "http://www.rockwellautomation.com/rockwellsoftware/factorytalk/" }, { "title": "Rockwell Automation Allen-Bradley FactoryTalk Input Validation Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/36065" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-8875" }, { "db": "JVNDB", "id": "JVNDB-2012-001982" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-53502" }, { "db": "JVNDB", "id": "JVNDB-2012-001982" }, { "db": "NVD", "id": "CVE-2012-0221" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-088-01.pdf" }, { "trust": 1.7, "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937" }, { "trust": 1.5, "url": "http://aluigi.altervista.org/adv/rnadiagreceiver_1-adv.txt" }, { "trust": 1.1, "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-12-017-01.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0221" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0221" }, { "trust": 0.6, "url": "http://ics-cert.us-cert.gov/advisories/icsa-12-088-01" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/51444" }, { "trust": 0.3, "url": "http://www.rockwellautomation.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8875" }, { "db": "VULHUB", "id": "VHN-53502" }, { "db": "BID", "id": "51444" }, { "db": "JVNDB", "id": "JVNDB-2012-001982" }, { "db": "CNNVD", "id": "CNNVD-201201-287" }, { "db": "CNNVD", "id": "CNNVD-201204-003" }, { "db": "NVD", "id": "CVE-2012-0221" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1" }, { "db": "IVD", "id": "fa04ef80-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ef44ea94-1f77-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "f0999908-1f77-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8875" }, { "db": "VULHUB", "id": "VHN-53502" }, { "db": "BID", "id": "51444" }, { "db": "JVNDB", "id": "JVNDB-2012-001982" }, { "db": "CNNVD", "id": "CNNVD-201201-287" }, { "db": "CNNVD", "id": "CNNVD-201204-003" }, { "db": "NVD", "id": "CVE-2012-0221" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-04-05T00:00:00", "db": "IVD", "id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1" }, { "date": "2012-04-05T00:00:00", "db": "IVD", "id": "fa04ef80-2353-11e6-abef-000c29c66e3d" }, { "date": "2012-01-19T00:00:00", "db": "IVD", "id": "ef44ea94-1f77-11e6-abef-000c29c66e3d" }, { "date": "2012-01-19T00:00:00", "db": "IVD", "id": "f0999908-1f77-11e6-abef-000c29c66e3d" }, { "date": "2012-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2012-0190" }, { "date": "2012-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2012-0189" }, { "date": "2012-04-05T00:00:00", "db": "CNVD", "id": "CNVD-2012-8875" }, { "date": "2012-04-02T00:00:00", "db": "VULHUB", "id": "VHN-53502" }, { "date": "2012-01-17T00:00:00", "db": "BID", "id": "51444" }, { "date": "2012-04-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001982" }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-287" }, { "date": "2012-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201204-003" }, { "date": "2012-04-02T18:55:01.043000", "db": "NVD", "id": "CVE-2012-0221" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2012-0190" }, { "date": "2012-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2012-0189" }, { "date": "2012-04-05T00:00:00", "db": "CNVD", "id": "CNVD-2012-8875" }, { "date": "2012-04-03T00:00:00", "db": "VULHUB", "id": "VHN-53502" }, { "date": "2012-03-28T22:10:00", "db": "BID", "id": "51444" }, { "date": "2012-04-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001982" }, { "date": "2012-01-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-287" }, { "date": "2012-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201204-003" }, { "date": "2024-11-21T01:34:36.607000", "db": "NVD", "id": "CVE-2012-0221" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201201-287" }, { "db": "CNNVD", "id": "CNNVD-201204-003" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rockwell Automation Allen-Bradley FactoryTalk Input validation vulnerability", "sources": [ { "db": "IVD", "id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1" }, { "db": "IVD", "id": "fa04ef80-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-8875" }, { "db": "CNNVD", "id": "CNNVD-201204-003" } ], "trust": 1.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation", "sources": [ { "db": "IVD", "id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1" }, { "db": "IVD", "id": "fa04ef80-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ef44ea94-1f77-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "f0999908-1f77-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201204-003" } ], "trust": 1.4 } }
var-201204-0174
Vulnerability from variot
The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted packet. Rockwell Automation is a provider of industrial automation, control and information technology solutions. Rockwell Automation FactoryTalk Activation Server RNADiagReceiver has errors in processing packets. Submitting a packet containing more than 2000 bytes to UDP port 4445 can result in no subsequent connections. An attacker can exploit these issues to crash the affected application, denying service to legitimate users
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201204-0174", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "factorytalk", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "cpr9" }, { "model": "rslogix 5000", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "18" }, { "model": "rslogix 5000", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "20" }, { "model": "rslogix 5000", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "17" }, { "model": "factorytalk", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "cpr9_sr5" }, { "model": "rslogix 5000", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "19" }, { "model": "automation rslogix", "scope": "eq", "trust": 1.5, "vendor": "rockwall", "version": "500018" }, { "model": "automation rslogix", "scope": "eq", "trust": 1.5, "vendor": "rockwall", "version": "500019" }, { "model": "automation rslogix", "scope": "eq", "trust": 1.5, "vendor": "rockwall", "version": "500017" }, { "model": "automation factorytalk activation server", "scope": "eq", "trust": 1.5, "vendor": "rockwall", "version": "3.2" }, { "model": "factorytalk", "scope": "eq", "trust": 0.8, "vendor": "rockwell automation", "version": "cpr9 to sr5" }, { "model": "rslogix 5000", "scope": "eq", "trust": 0.8, "vendor": "rockwell automation", "version": "17 to 20" }, { "model": null, "scope": null, "trust": 0.6, "vendor": "no", "version": null }, { "model": "cpr9", "scope": null, "trust": 0.4, "vendor": "factorytalk", "version": null }, { "model": "cpr9 sr5", "scope": null, "trust": 0.4, "vendor": "factorytalk", "version": null }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "rslogix 5000", "version": "17" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "rslogix 5000", "version": "18" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "rslogix 5000", "version": "19" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "rslogix 5000", "version": "20" }, { "model": "automation factorytalk cpr9-sr5", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9-sr4", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9-sr3", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9-sr2", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9-sr1", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk", "scope": "eq", "trust": 0.3, "vendor": "rockwall", "version": "0" } ], "sources": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "BID", "id": "51444" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "db": "CNNVD", "id": "CNNVD-201204-004" }, { "db": "NVD", "id": "CVE-2012-0222" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:rockwellautomation:factorytalk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:rockwellautomation:rslogix_5000", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001983" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma", "sources": [ { "db": "BID", "id": "51444" }, { "db": "CNNVD", "id": "CNNVD-201201-287" } ], "trust": 0.9 }, "cve": "CVE-2012-0222", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2012-0222", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2012-8874", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "7d70a8d0-463f-11e9-be91-000c29342cb1", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "f9f79006-2353-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-53503", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-0222", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-0222", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2012-8874", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201204-004", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-53503", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "VULHUB", "id": "VHN-53503" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "db": "CNNVD", "id": "CNNVD-201204-004" }, { "db": "NVD", "id": "CVE-2012-0222" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted packet. Rockwell Automation is a provider of industrial automation, control and information technology solutions. Rockwell Automation FactoryTalk Activation Server RNADiagReceiver has errors in processing packets. Submitting a packet containing more than 2000 bytes to UDP port 4445 can result in no subsequent connections. \nAn attacker can exploit these issues to crash the affected application, denying service to legitimate users", "sources": [ { "db": "NVD", "id": "CVE-2012-0222" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "BID", "id": "51444" }, { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-53503" } ], "trust": 3.96 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-0222", "trust": 3.8 }, { "db": "ICS CERT", "id": "ICSA-12-088-01", "trust": 3.4 }, { "db": "BID", "id": "51444", "trust": 2.1 }, { "db": "CNNVD", "id": "CNNVD-201204-004", "trust": 1.1 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-12-017-01", "trust": 1.1 }, { "db": "CNVD", "id": "CNVD-2012-8874", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2012-001983", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2012-0190", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2012-0189", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201201-287", "trust": 0.6 }, { "db": "IVD", "id": "7D70A8D0-463F-11E9-BE91-000C29342CB1", "trust": 0.2 }, { "db": "IVD", "id": "F9F79006-2353-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-53503", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "VULHUB", "id": "VHN-53503" }, { "db": "BID", "id": "51444" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "db": "CNNVD", "id": "CNNVD-201201-287" }, { "db": "CNNVD", "id": "CNNVD-201204-004" }, { "db": "NVD", "id": "CVE-2012-0222" } ] }, "id": "VAR-201204-0174", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "VULHUB", "id": "VHN-53503" } ], "trust": 3.125 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 2.2 } ], "sources": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8874" } ] }, "last_update_date": "2024-11-23T22:08:50.953000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RSLogix 5000", "trust": 0.8, "url": "http://www.rockwellautomation.com/rockwellsoftware/design/rslogix5000/" }, { "title": "FactoryTalk", "trust": 0.8, "url": "http://www.rockwellautomation.com/rockwellsoftware/factorytalk/" }, { "title": "Patch for Rockwell Automation Allen-Bradley FactoryTalk Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/36064" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-53503" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "db": "NVD", "id": "CVE-2012-0222" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-088-01.pdf" }, { "trust": 1.7, "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937" }, { "trust": 1.5, "url": "http://aluigi.altervista.org/adv/rnadiagreceiver_1-adv.txt" }, { "trust": 1.1, "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-12-017-01.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0222" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0222" }, { "trust": 0.6, "url": "http://ics-cert.us-cert.gov/advisories/icsa-12-088-01" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/51444" }, { "trust": 0.3, "url": "http://www.rockwellautomation.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "VULHUB", "id": "VHN-53503" }, { "db": "BID", "id": "51444" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "db": "CNNVD", "id": "CNNVD-201201-287" }, { "db": "CNNVD", "id": "CNNVD-201204-004" }, { "db": "NVD", "id": "CVE-2012-0222" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "VULHUB", "id": "VHN-53503" }, { "db": "BID", "id": "51444" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "db": "CNNVD", "id": "CNNVD-201201-287" }, { "db": "CNNVD", "id": "CNNVD-201204-004" }, { "db": "NVD", "id": "CVE-2012-0222" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-04-05T00:00:00", "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "date": "2012-04-05T00:00:00", "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "date": "2012-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2012-0190" }, { "date": "2012-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2012-0189" }, { "date": "2012-04-05T00:00:00", "db": "CNVD", "id": "CNVD-2012-8874" }, { "date": "2012-04-02T00:00:00", "db": "VULHUB", "id": "VHN-53503" }, { "date": "2012-01-17T00:00:00", "db": "BID", "id": "51444" }, { "date": "2012-04-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-287" }, { "date": "2012-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201204-004" }, { "date": "2012-04-02T18:55:01.090000", "db": "NVD", "id": "CVE-2012-0222" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2012-0190" }, { "date": "2012-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2012-0189" }, { "date": "2012-04-05T00:00:00", "db": "CNVD", "id": "CNVD-2012-8874" }, { "date": "2012-04-03T00:00:00", "db": "VULHUB", "id": "VHN-53503" }, { "date": "2012-03-28T22:10:00", "db": "BID", "id": "51444" }, { "date": "2012-04-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "date": "2012-01-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-287" }, { "date": "2012-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201204-004" }, { "date": "2024-11-21T01:34:36.730000", "db": "NVD", "id": "CVE-2012-0222" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201201-287" }, { "db": "CNNVD", "id": "CNNVD-201204-004" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rockwell Automation Allen-Bradley FactoryTalk Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "CNNVD", "id": "CNNVD-201204-004" } ], "trust": 1.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201204-004" } ], "trust": 1.0 } }