Vulnerabilites related to invensys - intouch
CVE-2012-0257 (GCVE-0-2012-0257)
Vulnerability from cvelistv5
Published
2012-04-02 20:00
Modified
2024-08-06 18:16
Severity ?
CWE
  • n/a
Summary
Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the Open member, leading to a function-pointer overwrite.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:20.093Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf"
          },
          {
            "name": "80891",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80891"
          },
          {
            "name": "48675",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48675"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the Open member, leading to a function-pointer overwrite."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-11-20T10:00:00",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf"
        },
        {
          "name": "80891",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80891"
        },
        {
          "name": "48675",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48675"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2012-0257",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the Open member, leading to a function-pointer overwrite."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf",
              "refsource": "MISC",
              "url": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf"
            },
            {
              "name": "80891",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80891"
            },
            {
              "name": "48675",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48675"
            },
            {
              "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf",
              "refsource": "MISC",
              "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2012-0257",
    "datePublished": "2012-04-02T20:00:00",
    "dateReserved": "2011-12-21T00:00:00",
    "dateUpdated": "2024-08-06T18:16:20.093Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0258 (GCVE-0-2012-0258)
Vulnerability from cvelistv5
Published
2012-04-02 20:00
Modified
2024-08-06 18:16
Severity ?
CWE
  • n/a
Summary
Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the AddFile member.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:16:20.081Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf"
          },
          {
            "name": "80891",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80891"
          },
          {
            "name": "48675",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48675"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the AddFile member."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-11-20T10:00:00",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf"
        },
        {
          "name": "80891",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80891"
        },
        {
          "name": "48675",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48675"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2012-0258",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the AddFile member."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf",
              "refsource": "MISC",
              "url": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf"
            },
            {
              "name": "80891",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80891"
            },
            {
              "name": "48675",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48675"
            },
            {
              "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf",
              "refsource": "MISC",
              "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2012-0258",
    "datePublished": "2012-04-02T20:00:00",
    "dateReserved": "2011-12-21T00:00:00",
    "dateUpdated": "2024-08-06T18:16:20.081Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-3847 (GCVE-0-2012-3847)
Vulnerability from cvelistv5
Published
2012-07-05 01:00
Modified
2024-08-06 20:21
Severity ?
CWE
  • n/a
Summary
slssvc.exe in Invensys Wonderware SuiteLink in Invensys InTouch 2012 and Wonderware Application Server 2012 allows remote attackers to cause a denial of service (resource consumption) via a long Unicode string, a different vulnerability than CVE-2012-3007.
References
http://secunia.com/advisories/49173third-party-advisory, x_refsource_SECUNIA
http://www.us-cert.gov/control_systems/pdf/ICSA-12-171-01.pdfx_refsource_MISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:21:03.634Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "49173",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49173"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-171-01.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-06-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "slssvc.exe in Invensys Wonderware SuiteLink in Invensys InTouch 2012 and Wonderware Application Server 2012 allows remote attackers to cause a denial of service (resource consumption) via a long Unicode string, a different vulnerability than CVE-2012-3007."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-13T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "49173",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49173"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-171-01.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-3847",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "slssvc.exe in Invensys Wonderware SuiteLink in Invensys InTouch 2012 and Wonderware Application Server 2012 allows remote attackers to cause a denial of service (resource consumption) via a long Unicode string, a different vulnerability than CVE-2012-3007."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "49173",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49173"
            },
            {
              "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-171-01.pdf",
              "refsource": "MISC",
              "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-171-01.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-3847",
    "datePublished": "2012-07-05T01:00:00",
    "dateReserved": "2012-07-04T00:00:00",
    "dateUpdated": "2024-08-06T20:21:03.634Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-3005 (GCVE-0-2012-3005)
Vulnerability from cvelistv5
Published
2012-07-26 10:00
Modified
2024-09-17 03:58
Severity ?
CWE
  • n/a
Summary
Untrusted search path vulnerability in Invensys Wonderware InTouch 2012 and earlier, as used in Wonderware Application Server, Wonderware Information Server, Foxboro Control Software, InFusion CE/FE/SCADA, InBatch, and Wonderware Historian, allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.353Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-177-02.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Untrusted search path vulnerability in Invensys Wonderware InTouch 2012 and earlier, as used in Wonderware Application Server, Wonderware Information Server, Foxboro Control Software, InFusion CE/FE/SCADA, InBatch, and Wonderware Historian, allows local users to gain privileges via a Trojan horse DLL in an unspecified directory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-26T10:00:00Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-177-02.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2012-3005",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Untrusted search path vulnerability in Invensys Wonderware InTouch 2012 and earlier, as used in Wonderware Application Server, Wonderware Information Server, Foxboro Control Software, InFusion CE/FE/SCADA, InBatch, and Wonderware Historian, allows local users to gain privileges via a Trojan horse DLL in an unspecified directory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-177-02.pdf",
              "refsource": "MISC",
              "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-177-02.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2012-3005",
    "datePublished": "2012-07-26T10:00:00Z",
    "dateReserved": "2012-05-30T00:00:00Z",
    "dateUpdated": "2024-09-17T03:58:58.880Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2012-07-05 03:23
Modified
2025-04-11 00:51
Severity ?
Summary
slssvc.exe in Invensys Wonderware SuiteLink in Invensys InTouch 2012 and Wonderware Application Server 2012 allows remote attackers to cause a denial of service (resource consumption) via a long Unicode string, a different vulnerability than CVE-2012-3007.
Impacted products
Vendor Product Version
invensys intouch 2012
invensys wonderware_application_server 2012



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:invensys:intouch:2012:*:*:*:*:*:*:*",
              "matchCriteriaId": "F87CFACA-2891-47A6-8AB7-4C27C0DDD415",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_application_server:2012:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FF76A0A-F7BF-4AF4-87A9-465427566800",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "slssvc.exe in Invensys Wonderware SuiteLink in Invensys InTouch 2012 and Wonderware Application Server 2012 allows remote attackers to cause a denial of service (resource consumption) via a long Unicode string, a different vulnerability than CVE-2012-3007."
    },
    {
      "lang": "es",
      "value": "slssvc.exe en Invensys Wonderware SuiteLink en Invensys InTouch 2012 y Wonderware Application Server 2012, permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de recursos) a trav\u00e9s de una larga cadena Unicode, una vulnerabilidad diferente a CVE-2012-3007."
    }
  ],
  "id": "CVE-2012-3847",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-07-05T03:23:18.683",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/49173"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-171-01.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49173"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-171-01.pdf"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-04-02 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the Open member, leading to a function-pointer overwrite.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:invensys:archestra_application_object_toolkit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCC6A67B-2844-4839-8CA2-C612C5B1EACB",
              "versionEndIncluding": "3.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:foxboro_control_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7F29DDE-04A2-462F-BA35-C1B27B9E96DF",
              "versionEndIncluding": "3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:infusion_control_edition:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBBD076-515A-470F-9C29-A902C2042A24",
              "versionEndIncluding": "2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:infusion_foundation_edition:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D10B2C8-CC92-491E-91F6-EAD96E878BE3",
              "versionEndIncluding": "2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:infusion_scada:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAACC06C-4E8C-4E66-B007-E6BC9DAFEEAF",
              "versionEndIncluding": "2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:intouch:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDF7AED-4176-4EB8-8557-582BA29B63D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:intouch:10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF608404-2B0D-4FD1-9768-E984AE5F23D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_application_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "550932A9-9B6A-439A-A5A4-CAFB24DB28C8",
              "versionEndIncluding": "2012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_information_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4265378-CF22-42AC-B63C-73F96507E680",
              "versionEndIncluding": "4.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_information_server:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "262CBEB8-A6EA-48DE-B5A5-460660F33442",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_information_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC154F44-2618-4AD5-B252-98E521F98CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "325DE4D6-7649-4566-BC6E-1F8DC16FF1A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the Open member, leading to a function-pointer overwrite."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica  en el componente ActiveX WWCabFile en Wonderware System Platform en Invensys Wonderware Application Server 2012 y anteriores, Foxboro Control Software v3.1 y anteriores, InFusion CE/FE/SCADA v2.5 y anteriores, Wonderware Information Server v4.5 y anteriores, ArchestrA Application Object Toolkit v3.2 y anteriores, y InTouch v10.0 hasta v10.5 ,permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una cadena larga sobre el miembro Open, provocando una sobrescritura de un puntero a funci\u00f3n."
    }
  ],
  "id": "CVE-2012-0257",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-04-02T20:55:02.187",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "http://osvdb.org/80891"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/48675"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf"
    },
    {
      "source": "cret@cert.org",
      "url": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80891"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48675"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-04-02 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the AddFile member.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:invensys:archestra_application_object_toolkit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCC6A67B-2844-4839-8CA2-C612C5B1EACB",
              "versionEndIncluding": "3.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:foxboro_control_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7F29DDE-04A2-462F-BA35-C1B27B9E96DF",
              "versionEndIncluding": "3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:infusion_control_edition:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBBD076-515A-470F-9C29-A902C2042A24",
              "versionEndIncluding": "2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:infusion_foundation_edition:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D10B2C8-CC92-491E-91F6-EAD96E878BE3",
              "versionEndIncluding": "2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:infusion_scada:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAACC06C-4E8C-4E66-B007-E6BC9DAFEEAF",
              "versionEndIncluding": "2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:intouch:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDF7AED-4176-4EB8-8557-582BA29B63D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:intouch:10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF608404-2B0D-4FD1-9768-E984AE5F23D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_application_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "550932A9-9B6A-439A-A5A4-CAFB24DB28C8",
              "versionEndIncluding": "2012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_information_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4265378-CF22-42AC-B63C-73F96507E680",
              "versionEndIncluding": "4.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_information_server:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "262CBEB8-A6EA-48DE-B5A5-460660F33442",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_information_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC154F44-2618-4AD5-B252-98E521F98CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "325DE4D6-7649-4566-BC6E-1F8DC16FF1A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the AddFile member."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica  en el componente ActiveX WWCabFile en Wonderware System Platform en Invensys Wonderware Application Server 2012 y anteriores, Foxboro Control Software v3.1 y anteriores, InFusion CE/FE/SCADA v2.5 y anteriores, Wonderware Information Server v4.5 y anteriores, ArchestrA Application Object Toolkit v3.2 y anteriores, y InTouch v10.0 hasta v10.5 ,permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una cadena larga sobre el miembro Addfile."
    }
  ],
  "id": "CVE-2012-0258",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-04-02T20:55:02.230",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "http://osvdb.org/80891"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/48675"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf"
    },
    {
      "source": "cret@cert.org",
      "url": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80891"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48675"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-07-26 10:41
Modified
2025-04-11 00:51
Severity ?
Summary
Untrusted search path vulnerability in Invensys Wonderware InTouch 2012 and earlier, as used in Wonderware Application Server, Wonderware Information Server, Foxboro Control Software, InFusion CE/FE/SCADA, InBatch, and Wonderware Historian, allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:invensys:foxboro_control_software:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8066239-FE54-49DD-8D55-E4681BED297F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:foxboro_control_software:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54861639-8E21-4E67-B776-8A1024657457",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:infusion_ce\\/fe\\/scada:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC4B215-533F-4950-9D81-711F1B669A22",
              "versionEndIncluding": "2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:intouch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "510DAA85-68A1-4BAF-BC27-18D71BD06F97",
              "versionEndIncluding": "2012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:intouch\\/wonderware_application_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "255276F6-6C83-4A5D-98B9-7ABD831236BA",
              "versionEndIncluding": "2012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:intouch\\/wonderware_application_server:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "337B2BEC-029A-491F-8E91-74AE7595CBAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:intouch\\/wonderware_application_server:10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0221FC49-8A68-4A22-AB09-BF7CC236DC25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_historian:*:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "39F227E3-8B8E-4B21-98F4-DDABBE370B27",
              "versionEndIncluding": "10.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_historian:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5579D221-3F63-480C-A439-B68E94EF0B95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_inbatch:*:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "47BB631F-51B7-447B-8E03-ECDB9C3EEFE7",
              "versionEndIncluding": "9.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_information_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4265378-CF22-42AC-B63C-73F96507E680",
              "versionEndIncluding": "4.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_information_server:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "262CBEB8-A6EA-48DE-B5A5-460660F33442",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_information_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC154F44-2618-4AD5-B252-98E521F98CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "325DE4D6-7649-4566-BC6E-1F8DC16FF1A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Untrusted search path vulnerability in Invensys Wonderware InTouch 2012 and earlier, as used in Wonderware Application Server, Wonderware Information Server, Foxboro Control Software, InFusion CE/FE/SCADA, InBatch, and Wonderware Historian, allows local users to gain privileges via a Trojan horse DLL in an unspecified directory."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de ruta de b\u00fasqueda no confiable en Invensys Wonderware InTouch 2012 y anteriores, tal como se utiliza en el servidor de aplicaciones Wonderware, Wonderware Information Server, Foxboro Control Software, InFusion CE/FE/SCADA, InBatch y Wonderware Historian, permite a usuarios locales conseguir privilegios a trav\u00e9s de un DLL troyano en un directorio no especificado.\r\n"
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n\u0027CWE-426: Untrusted Search Path\u0027",
  "id": "CVE-2012-3005",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-07-26T10:41:47.747",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-177-02.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-177-02.pdf"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

var-201207-0134
Vulnerability from variot

Stack-based buffer overflow in slssvc.exe before 58.x in Invensys Wonderware SuiteLink in the Invensys System Platform software suite, as used in InTouch/Wonderware Application Server IT before 10.5 and WAS before 3.5, DASABCIP before 4.1 SP2, DASSiDirect before 3.0, DAServer Runtime Components before 3.0 SP2, and other products, allows remote attackers to cause a denial of service (daemon crash or hang) via a long Unicode string. WonderWare is an industrial control and automation software. Wonderware SuiteLink is prone to a remote denial-of-service vulnerability. Exploiting this issue allows remote attackers to crash the affected application, denying service to legitimate users. These products are as follows: InTouch/Wonderware Application Server IT pre-10.5 and WAS pre-3.5, DASABCIP pre-4.1 SP2, DASSiDirect pre-3.0, DAServer Runtime Components pre-3.0 SP2 and others. ----------------------------------------------------------------------

Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch


TITLE: Invensys Wonderware InTouch SuiteLink Service Denial of Service Vulnerability

SECUNIA ADVISORY ID: SA49173

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49173/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49173

RELEASE DATE: 2012-05-16

DISCUSS ADVISORY: http://secunia.com/advisories/49173/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/49173/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=49173

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: Luigi Auriemma has discovered a vulnerability in Invensys Wonderware InTouch, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the SuiteLink Service (slssvc.exe) when processing certain packets. This can be exploited to cause the service to crash via a specially crafted packet sent to TCP port 5413.

The vulnerability is confirmed in version 10.1.300 Build 0268 (slssvc.exe version 51.5.0.0). Other versions may also be affected.

SOLUTION: Restrict access to trusted hosts only.

PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma

ORIGINAL ADVISORY: Luigi Auriemma: http://aluigi.altervista.org/adv/suitelink_1-adv.txt

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "dasabcip",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "4.1"
      },
      {
        "_id": null,
        "model": "wonderware application server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "3.0"
      },
      {
        "_id": null,
        "model": "daserver runtime components",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "3.0"
      },
      {
        "_id": null,
        "model": "wonderware application server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "3.1.201"
      },
      {
        "_id": null,
        "model": "wonderware application server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "3.1"
      },
      {
        "_id": null,
        "model": "wonderware application server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "3.0.200"
      },
      {
        "_id": null,
        "model": "dasabcip",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "4.1"
      },
      {
        "_id": null,
        "model": "dassidirect",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "2.0"
      },
      {
        "_id": null,
        "model": "daserver runtime components",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "3.0"
      },
      {
        "_id": null,
        "model": "intouch\\/wonderware application server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "10.0"
      },
      {
        "_id": null,
        "model": "wonderware application server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "3.1"
      },
      {
        "_id": null,
        "model": "dasabcip",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "4.1 sp2"
      },
      {
        "_id": null,
        "model": "daserver runtime component",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "3.0 sp2"
      },
      {
        "_id": null,
        "model": "dassidirect",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "3.0"
      },
      {
        "_id": null,
        "model": "intouch",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "10.5"
      },
      {
        "_id": null,
        "model": "wonderware application server",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "3.5"
      },
      {
        "_id": null,
        "model": "intouch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2012"
      },
      {
        "_id": null,
        "model": "wonderware application server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2012"
      },
      {
        "_id": null,
        "model": "intouch\\/wonderware application server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "10.0"
      },
      {
        "_id": null,
        "model": "dassidirect",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2.0"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "wonderware application server",
        "version": "3.1"
      },
      {
        "_id": null,
        "model": "intouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wonderware",
        "version": "7.11"
      },
      {
        "_id": null,
        "model": "intouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wonderware",
        "version": "9.5"
      },
      {
        "_id": null,
        "model": "intouch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wonderware",
        "version": "8.0"
      },
      {
        "_id": null,
        "model": "intouch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "wonderware",
        "version": "10.5"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "dasabcip",
        "version": "4.1"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "dasabcip",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "daserver runtime components",
        "version": "3.0"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "daserver runtime components",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "dassidirect",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "intouch wonderware application server",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware application server",
        "version": "3.0"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware application server",
        "version": "3.0.200"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware application server",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware application server",
        "version": "3.1.201"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b1884d1a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3548"
      },
      {
        "db": "BID",
        "id": "53563"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003015"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-049"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3007"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:invensys:dasabcip",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:daserver_runtime_components",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:dassidirect",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:intouch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:wonderware_application_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003015"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Luigi Auriemma",
    "sources": [
      {
        "db": "BID",
        "id": "53563"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-849"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2012-3007",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2012-3007",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "b1884d1a-2353-11e6-abef-000c29c66e3d",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-56288",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-3007",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-3007",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201207-049",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "b1884d1a-2353-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-56288",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b1884d1a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56288"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003015"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-049"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3007"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Stack-based buffer overflow in slssvc.exe before 58.x in Invensys Wonderware SuiteLink in the Invensys System Platform software suite, as used in InTouch/Wonderware Application Server IT before 10.5 and WAS before 3.5, DASABCIP before 4.1 SP2, DASSiDirect before 3.0, DAServer Runtime Components before 3.0 SP2, and other products, allows remote attackers to cause a denial of service (daemon crash or hang) via a long Unicode string. WonderWare is an industrial control and automation software. Wonderware SuiteLink is prone to a remote  denial-of-service vulnerability. \nExploiting this issue allows remote attackers to crash the affected application, denying service to legitimate users. These products are as follows: InTouch/Wonderware Application Server IT pre-10.5 and WAS pre-3.5, DASABCIP pre-4.1 SP2, DASSiDirect pre-3.0, DAServer Runtime Components pre-3.0 SP2 and others. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nInvensys Wonderware InTouch SuiteLink Service Denial of Service\nVulnerability\n\nSECUNIA ADVISORY ID:\nSA49173\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49173/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49173\n\nRELEASE DATE:\n2012-05-16\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49173/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49173/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49173\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nLuigi Auriemma has discovered a vulnerability in Invensys Wonderware\nInTouch, which can be exploited by malicious people to cause a DoS\n(Denial of Service). \n\nThe vulnerability is caused due to an error within the SuiteLink\nService (slssvc.exe) when processing certain packets. This can be\nexploited to cause the service to crash via a specially crafted\npacket sent to TCP port 5413. \n\nThe vulnerability is confirmed in version 10.1.300 Build 0268\n(slssvc.exe version 51.5.0.0). Other versions may also be affected. \n\nSOLUTION:\nRestrict access to trusted hosts only. \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nLuigi Auriemma:\nhttp://aluigi.altervista.org/adv/suitelink_1-adv.txt\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-3007"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003015"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3548"
      },
      {
        "db": "BID",
        "id": "53563"
      },
      {
        "db": "IVD",
        "id": "b1884d1a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56288"
      },
      {
        "db": "PACKETSTORM",
        "id": "112815"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-3007",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-12-171-01",
        "trust": 3.1
      },
      {
        "db": "BID",
        "id": "53563",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "49173",
        "trust": 1.2
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-049",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3548",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003015",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-849",
        "trust": 0.6
      },
      {
        "db": "ICS CERT ALERT",
        "id": "ICS-ALERT-12-136-01",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "B1884D1A-2353-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-56288",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "112815",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b1884d1a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56288"
      },
      {
        "db": "BID",
        "id": "53563"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003015"
      },
      {
        "db": "PACKETSTORM",
        "id": "112815"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-849"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-049"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3007"
      }
    ]
  },
  "id": "VAR-201207-0134",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "b1884d1a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56288"
      }
    ],
    "trust": 1.4971608333333335
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b1884d1a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3548"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:46:17.303000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "SuiteLink Service (SLSSVC) Vulnerability (LFSEC 00000038 - UPDATED)",
        "trust": 0.8,
        "url": "http://iom.invensys.com/EN/pdfLibrary/Security_Bulletin_LFSEC00000038.pdf"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://global.wonderware.com/"
      },
      {
        "title": "Wonderware \u65e5\u672c\u306e\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://global.wonderware.com/JP/Pages/JpPartnersSI.aspx"
      },
      {
        "title": "Wonderware Top Page",
        "trust": 0.8,
        "url": "http://global.wonderware.com/JP/pages/default.aspx"
      },
      {
        "title": "Patch for Invensys Wonderware SuiteLink Stack Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/18634"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3548"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003015"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-56288"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003015"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3007"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 3.1,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-171-01.pdf"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/53563"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/49173"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3007"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3007"
      },
      {
        "trust": 0.4,
        "url": "http://aluigi.altervista.org/adv/suitelink_1-adv.txt"
      },
      {
        "trust": 0.3,
        "url": "http://global.wonderware.com/en/pages/default.aspx"
      },
      {
        "trust": 0.3,
        "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-12-136-01.pdf"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/psi_30_beta_launch"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49173"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/49173/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/49173/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56288"
      },
      {
        "db": "BID",
        "id": "53563"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003015"
      },
      {
        "db": "PACKETSTORM",
        "id": "112815"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-849"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-049"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3007"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "b1884d1a-2353-11e6-abef-000c29c66e3d",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3548",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-56288",
        "ident": null
      },
      {
        "db": "BID",
        "id": "53563",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003015",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "112815",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-849",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-049",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3007",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2012-07-09T00:00:00",
        "db": "IVD",
        "id": "b1884d1a-2353-11e6-abef-000c29c66e3d",
        "ident": null
      },
      {
        "date": "2012-07-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-3548",
        "ident": null
      },
      {
        "date": "2012-07-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-56288",
        "ident": null
      },
      {
        "date": "2012-05-15T00:00:00",
        "db": "BID",
        "id": "53563",
        "ident": null
      },
      {
        "date": "2012-07-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-003015",
        "ident": null
      },
      {
        "date": "2012-05-17T11:19:10",
        "db": "PACKETSTORM",
        "id": "112815",
        "ident": null
      },
      {
        "date": "2012-05-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201210-849",
        "ident": null
      },
      {
        "date": "2012-07-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201207-049",
        "ident": null
      },
      {
        "date": "2012-07-05T03:23:18.637000",
        "db": "NVD",
        "id": "CVE-2012-3007",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2012-07-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-3548",
        "ident": null
      },
      {
        "date": "2012-08-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-56288",
        "ident": null
      },
      {
        "date": "2015-03-19T09:08:00",
        "db": "BID",
        "id": "53563",
        "ident": null
      },
      {
        "date": "2012-07-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-003015",
        "ident": null
      },
      {
        "date": "2012-11-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201210-849",
        "ident": null
      },
      {
        "date": "2012-07-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201207-049",
        "ident": null
      },
      {
        "date": "2024-11-21T01:40:06.653000",
        "db": "NVD",
        "id": "CVE-2012-3007",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-849"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-049"
      }
    ],
    "trust": 1.2
  },
  "title": {
    "_id": null,
    "data": "Wonderware SuiteLink Unallocated Unicode String Remote Denial of Service Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "53563"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201210-849"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "_id": null,
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "b1884d1a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-049"
      }
    ],
    "trust": 0.8
  }
}

var-201204-0163
Vulnerability from variot

Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the Open member, leading to a function-pointer overwrite. Invensys is a leading provider of automation and information technology, systems, software solutions, services and consulting for the manufacturing and infrastructure industries. Invensys WWCabFile AciveX component has a heap-based buffer overflow. Multiple Invensys products are prone to multiple heap-based buffer-overflow vulnerabilities. Attackers may exploit these issues to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. ----------------------------------------------------------------------

Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch


TITLE: Invensys Products ActiveX Control Buffer Overflow Vulnerabilities

SECUNIA ADVISORY ID: SA48675

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48675/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48675

RELEASE DATE: 2012-04-02

DISCUSS ADVISORY: http://secunia.com/advisories/48675/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/48675/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=48675

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: Two vulnerabilities have been reported in Invensys products, which can be exploited by malicious people to compromise a user's system.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code. * Invensys Wonderware InTouch versions 10.0 through 10.5.

SOLUTION: Install patch. Please see the vendor's advisory for more information.

PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Celil Unuver, SignalSec Corporation.

ORIGINAL ADVISORY: ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf

Wonderware (requires login): https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201204-0163",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "intouch",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "invensys",
        "version": "10.0"
      },
      {
        "model": "intouch",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "invensys",
        "version": "10.5"
      },
      {
        "model": "archestra application object toolkit",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "3.2"
      },
      {
        "model": "foxboro control software",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "3.1"
      },
      {
        "model": "infusion control edition",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": "infusion foundation edition",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": "infusion scada",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": "wonderware application server",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "2012"
      },
      {
        "model": "wonderware information server",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "4.5"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "4.0"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 1.5,
        "vendor": "invensys",
        "version": "4.5"
      },
      {
        "model": "foxboro control software",
        "scope": "eq",
        "trust": 1.5,
        "vendor": "invensys",
        "version": "3.1"
      },
      {
        "model": "archestra application object toolkit",
        "scope": "eq",
        "trust": 1.5,
        "vendor": "invensys",
        "version": "3.2"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "3.1"
      },
      {
        "model": "wonderware application server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "invensys",
        "version": "20120"
      },
      {
        "model": "infusion ce/fe/scada",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": "intouch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "10.0 to  10.5"
      },
      {
        "model": "wonderware application server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2012"
      },
      {
        "model": "infusion control edition",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": "infusion scada",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": "infusion foundation edition",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "wonderware information server",
        "version": "4.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "archestra application object toolkit",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "foxboro control",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "infusion control edition",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "infusion edition",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "infusion scada",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "intouch",
        "version": "10.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "intouch",
        "version": "10.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware application server",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware information server",
        "version": "3.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware information server",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "f9b5871a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1690"
      },
      {
        "db": "BID",
        "id": "52835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001987"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-596"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0257"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:invensys:archestra_application_object_toolkit",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:foxboro_control_software",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:infusion_control_edition",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:infusion_foundation_edition",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:infusion_scada",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:intouch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:wonderware_application_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:wonderware_information_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001987"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Celil Unuver of SignalSec Corporation",
    "sources": [
      {
        "db": "BID",
        "id": "52835"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-596"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2012-0257",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2012-0257",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "f9b5871a-2353-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-53538",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-0257",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-0257",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201203-596",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "f9b5871a-2353-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-53538",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "f9b5871a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53538"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001987"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-596"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0257"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the Open member, leading to a function-pointer overwrite. Invensys is a leading provider of automation and information technology, systems, software solutions, services and consulting for the manufacturing and infrastructure industries. Invensys WWCabFile AciveX component has a heap-based buffer overflow. Multiple Invensys products are prone to multiple heap-based buffer-overflow vulnerabilities. \nAttackers may exploit these issues to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nInvensys Products ActiveX Control Buffer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA48675\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/48675/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48675\n\nRELEASE DATE:\n2012-04-02\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/48675/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/48675/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48675\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nTwo vulnerabilities have been reported in Invensys products, which\ncan be exploited by malicious people to compromise a user\u0027s system. \n\nSuccessful exploitation of the vulnerabilities may allow execution of\narbitrary code. \n* Invensys Wonderware InTouch versions 10.0 through 10.5. \n\nSOLUTION:\nInstall patch. Please see the vendor\u0027s advisory for more information. \n\nPROVIDED AND/OR DISCOVERED BY:\nICS-CERT credits Celil Unuver, SignalSec Corporation. \n\nORIGINAL ADVISORY:\nICS-CERT:\nhttp://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf\n\nWonderware (requires login):\nhttps://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-0257"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001987"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1690"
      },
      {
        "db": "BID",
        "id": "52835"
      },
      {
        "db": "IVD",
        "id": "f9b5871a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53538"
      },
      {
        "db": "PACKETSTORM",
        "id": "111462"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-0257",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-12-081-01",
        "trust": 3.5
      },
      {
        "db": "SECUNIA",
        "id": "48675",
        "trust": 1.9
      },
      {
        "db": "OSVDB",
        "id": "80891",
        "trust": 1.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-596",
        "trust": 0.9
      },
      {
        "db": "BID",
        "id": "52835",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1690",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001987",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "F9B5871A-2353-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-53538",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "111462",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "f9b5871a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1690"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53538"
      },
      {
        "db": "BID",
        "id": "52835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001987"
      },
      {
        "db": "PACKETSTORM",
        "id": "111462"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-596"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0257"
      }
    ]
  },
  "id": "VAR-201204-0163",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "f9b5871a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1690"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53538"
      }
    ],
    "trust": 1.5170465000000002
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "f9b5871a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1690"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:31:32.979000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://global.wonderware.com/EN/Pages/default.aspx"
      },
      {
        "title": "\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u30fb\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://iom.invensys.com/JP/Pages/IOM_HardwarePartners.aspx"
      },
      {
        "title": "\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30fb\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://iom.invensys.com/JP/Pages/IOM_SoftwarePartners.aspx"
      },
      {
        "title": "Wonderware \u65e5\u672c\u306e\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://global.wonderware.com/JP/Pages/JpPartnersSI.aspx"
      },
      {
        "title": "Wonderware Top Page",
        "trust": 0.8,
        "url": "http://iom.invensys.com/JP/Pages/home.aspx"
      },
      {
        "title": "Patch for Multiple Invensys Products Remote Heap Buffer Overflow Vulnerability (CNVD-2012-1690)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/15178"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-1690"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001987"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-53538"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001987"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0257"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.5,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-081-01.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://wdnresource.wonderware.com/support/docs/_securitybulletins/security_bulletin_lfsec00000071.pdf"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/48675"
      },
      {
        "trust": 1.1,
        "url": "http://osvdb.org/80891"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0257"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0257"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/52835"
      },
      {
        "trust": 0.3,
        "url": "http://global.wonderware.com/en/pages/default.aspx"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/48675/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/psi_30_beta_launch"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/48675/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48675"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-1690"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53538"
      },
      {
        "db": "BID",
        "id": "52835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001987"
      },
      {
        "db": "PACKETSTORM",
        "id": "111462"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-596"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0257"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "f9b5871a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1690"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53538"
      },
      {
        "db": "BID",
        "id": "52835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001987"
      },
      {
        "db": "PACKETSTORM",
        "id": "111462"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-596"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0257"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-04-01T00:00:00",
        "db": "IVD",
        "id": "f9b5871a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2012-04-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-1690"
      },
      {
        "date": "2012-04-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-53538"
      },
      {
        "date": "2012-03-30T00:00:00",
        "db": "BID",
        "id": "52835"
      },
      {
        "date": "2012-04-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-001987"
      },
      {
        "date": "2012-04-02T05:26:16",
        "db": "PACKETSTORM",
        "id": "111462"
      },
      {
        "date": "2012-03-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201203-596"
      },
      {
        "date": "2012-04-02T20:55:02.187000",
        "db": "NVD",
        "id": "CVE-2012-0257"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-04-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-1690"
      },
      {
        "date": "2013-03-26T00:00:00",
        "db": "VULHUB",
        "id": "VHN-53538"
      },
      {
        "date": "2012-03-30T00:00:00",
        "db": "BID",
        "id": "52835"
      },
      {
        "date": "2012-04-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-001987"
      },
      {
        "date": "2012-04-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201203-596"
      },
      {
        "date": "2024-11-21T01:34:40.433000",
        "db": "NVD",
        "id": "CVE-2012-0257"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-596"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Invensys Heap-based buffer overflow vulnerability in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001987"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "f9b5871a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-596"
      }
    ],
    "trust": 0.8
  }
}

var-201207-0173
Vulnerability from variot

Untrusted search path vulnerability in Invensys Wonderware InTouch 2012 and earlier, as used in Wonderware Application Server, Wonderware Information Server, Foxboro Control Software, InFusion CE/FE/SCADA, InBatch, and Wonderware Historian, allows local users to gain privileges via a Trojan horse DLL in an unspecified directory. DLL It may be possible to get permission through the file. Invensys is a leading provider of automation and information technology, systems, software solutions, services and consulting for the manufacturing and infrastructure industries. Multiple Invensys Wonderware products are insecure to load library files, allowing an attacker to build specially crafted files, place them on a remote WebDAV or SMB share, entice users to parse, and execute arbitrary code in the application context. Multiple Invensys products are prone to a vulnerability that lets attackers execute arbitrary code. ----------------------------------------------------------------------

We are millions! Join us to protect all Pc's Worldwide. Download the new Secunia PSI 3.0 available in 5 languages and share it with your friends: http://secunia.com/psi


TITLE: Invensys Wonderware Products Insecure Library Loading Vulnerability

SECUNIA ADVISORY ID: SA50028

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50028/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50028

RELEASE DATE: 2012-07-24

DISCUSS ADVISORY: http://secunia.com/advisories/50028/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/50028/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=50028

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been reported in multiple Invensys Wonderware products, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to the application loading libraries in an insecure manner.

Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Carlos Mario Penagos Hollmann.

ORIGINAL ADVISORY: http://www.us-cert.gov/control_systems/pdf/ICSA-12-177-02.pdf

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201207-0173",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "intouch",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "2012"
      },
      {
        "model": "wonderware information server",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "4.5"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "3.1"
      },
      {
        "model": "foxboro control software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "4.0"
      },
      {
        "model": "wonderware historian",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "10.0"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "4.0"
      },
      {
        "model": "foxboro control software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "3.1"
      },
      {
        "model": "intouch\\/wonderware application server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "10.5"
      },
      {
        "model": "intouch\\/wonderware application server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "2012"
      },
      {
        "model": "wonderware inbatch",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "9.5"
      },
      {
        "model": "infusion ce\\/fe\\/scada",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": "wonderware historian",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "10.0"
      },
      {
        "model": "intouch\\/wonderware application server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "10.0"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "invensys",
        "version": "4.5"
      },
      {
        "model": "foxboro control software",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "4.0"
      },
      {
        "model": "infusion ce/fe/scada",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": "wonderware application server",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "2012"
      },
      {
        "model": "wonderware historian",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "10.0 sp1"
      },
      {
        "model": "wonderware inbatch",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "9.5 sp1"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "4.x"
      },
      {
        "model": "wonderware inbatch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "9.x"
      },
      {
        "model": "foxboro control software",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "4.x"
      },
      {
        "model": "wonderware application server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "3.x"
      },
      {
        "model": "wonderware application server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2012"
      },
      {
        "model": "infusion control edition",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2.x"
      },
      {
        "model": "infusion foundation edition",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2.x"
      },
      {
        "model": "infusion scada",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2.x"
      },
      {
        "model": "wonderware historian client",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "10.x"
      },
      {
        "model": "wonderware intouch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "10.x"
      },
      {
        "model": "wonderware inbatch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "9.5"
      },
      {
        "model": "infusion ce\\/fe\\/scada",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "wonderware information server",
        "version": "4.0"
      },
      {
        "model": "wonderware inbatch sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "invensys",
        "version": "9.5"
      },
      {
        "model": "wonderware application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "invensys",
        "version": "20120"
      },
      {
        "model": "infusion ce/fe/scada",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "foxboro control",
        "version": "3.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "foxboro control",
        "version": "4.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "infusion ce fe scada",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "intouch",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "intouch wonderware application server",
        "version": "10.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "intouch wonderware application server",
        "version": "10.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "intouch wonderware application server",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware historian",
        "version": "10.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware historian",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware inbatch",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware information server",
        "version": "3.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware information server",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "94295318-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3891"
      },
      {
        "db": "BID",
        "id": "54646"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003409"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-432"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3005"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:invensys:foxboro_control_software",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:infusion_ce%2Ffe%2Fscada",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:intouch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:wonderware_application_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:wonderware_historian",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:wonderware_inbatch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:wonderware_information_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003409"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Carlos Mario Penagos Hollmann",
    "sources": [
      {
        "db": "BID",
        "id": "54646"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-3005",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "CVE-2012-3005",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "94295318-2353-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "VHN-56286",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-3005",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-3005",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201207-432",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "94295318-2353-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-56286",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "94295318-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56286"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003409"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-432"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3005"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Untrusted search path vulnerability in Invensys Wonderware InTouch 2012 and earlier, as used in Wonderware Application Server, Wonderware Information Server, Foxboro Control Software, InFusion CE/FE/SCADA, InBatch, and Wonderware Historian, allows local users to gain privileges via a Trojan horse DLL in an unspecified directory. DLL It may be possible to get permission through the file. Invensys is a leading provider of automation and information technology, systems, software solutions, services and consulting for the manufacturing and infrastructure industries. Multiple Invensys Wonderware products are insecure to load library files, allowing an attacker to build specially crafted files, place them on a remote WebDAV or SMB share, entice users to parse, and execute arbitrary code in the application context. Multiple Invensys products are prone to a vulnerability that lets attackers execute arbitrary code. ----------------------------------------------------------------------\n\nWe are millions!  Join us to protect all Pc\u0027s Worldwide. \nDownload the new Secunia PSI 3.0 available in 5 languages and share it with your friends:\nhttp://secunia.com/psi\n\n----------------------------------------------------------------------\n\nTITLE:\nInvensys Wonderware Products Insecure Library Loading Vulnerability\n\nSECUNIA ADVISORY ID:\nSA50028\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/50028/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50028\n\nRELEASE DATE:\n2012-07-24\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/50028/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/50028/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50028\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in multiple Invensys Wonderware\nproducts, which can be exploited by malicious people to compromise a\nuser\u0027s system. \n\nThe vulnerability is caused due to the application loading libraries\nin an insecure manner. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nICS-CERT credits Carlos Mario Penagos Hollmann. \n\nORIGINAL ADVISORY:\nhttp://www.us-cert.gov/control_systems/pdf/ICSA-12-177-02.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-3005"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003409"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3891"
      },
      {
        "db": "BID",
        "id": "54646"
      },
      {
        "db": "IVD",
        "id": "94295318-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56286"
      },
      {
        "db": "PACKETSTORM",
        "id": "114985"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-3005",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-12-177-02",
        "trust": 2.9
      },
      {
        "db": "SECUNIA",
        "id": "50028",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-432",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3891",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003409",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "54646",
        "trust": 0.4
      },
      {
        "db": "IVD",
        "id": "94295318-2353-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-56286",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "114985",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "94295318-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3891"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56286"
      },
      {
        "db": "BID",
        "id": "54646"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003409"
      },
      {
        "db": "PACKETSTORM",
        "id": "114985"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-432"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3005"
      }
    ]
  },
  "id": "VAR-201207-0173",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "94295318-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3891"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56286"
      }
    ],
    "trust": 1.5819730125
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "94295318-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3891"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:56:43.430000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://iom.invensys.com/EN/Pages/home.aspx"
      },
      {
        "title": "Wonderware \u65e5\u672c\u306e\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://global.wonderware.com/JP/Pages/JpPartnersSI.aspx"
      },
      {
        "title": "Wonderware Top Page",
        "trust": 0.8,
        "url": "http://global.wonderware.com/JP/pages/default.aspx"
      },
      {
        "title": "Invensys product DLL loads patches for arbitrary code execution vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/19202"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3891"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003409"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003409"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3005"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.9,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-177-02.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3005"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3005"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/50028/http"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/50028"
      },
      {
        "trust": 0.3,
        "url": "http://global.wonderware.com/en/pages/default.aspx"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/50028/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/psi"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/50028/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50028"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3891"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56286"
      },
      {
        "db": "BID",
        "id": "54646"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003409"
      },
      {
        "db": "PACKETSTORM",
        "id": "114985"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-432"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3005"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "94295318-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3891"
      },
      {
        "db": "VULHUB",
        "id": "VHN-56286"
      },
      {
        "db": "BID",
        "id": "54646"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003409"
      },
      {
        "db": "PACKETSTORM",
        "id": "114985"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-432"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3005"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-07-26T00:00:00",
        "db": "IVD",
        "id": "94295318-2353-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2012-07-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-3891"
      },
      {
        "date": "2012-07-26T00:00:00",
        "db": "VULHUB",
        "id": "VHN-56286"
      },
      {
        "date": "2012-07-23T00:00:00",
        "db": "BID",
        "id": "54646"
      },
      {
        "date": "2012-07-30T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-003409"
      },
      {
        "date": "2012-07-25T04:54:59",
        "db": "PACKETSTORM",
        "id": "114985"
      },
      {
        "date": "2012-07-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201207-432"
      },
      {
        "date": "2012-07-26T10:41:47.747000",
        "db": "NVD",
        "id": "CVE-2012-3005"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-07-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-3891"
      },
      {
        "date": "2012-07-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-56286"
      },
      {
        "date": "2015-03-19T08:51:00",
        "db": "BID",
        "id": "54646"
      },
      {
        "date": "2012-07-30T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-003409"
      },
      {
        "date": "2012-07-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201207-432"
      },
      {
        "date": "2024-11-21T01:40:06.403000",
        "db": "NVD",
        "id": "CVE-2012-3005"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "54646"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-432"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Invensys Wonderware InTouch Vulnerability gained in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003409"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "IVD",
        "id": "94295318-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-432"
      }
    ],
    "trust": 0.8
  }
}

var-201212-0033
Vulnerability from variot

Invensys Wonderware InTouch 2012 R2 and earlier and Siemens ProcessSuite use a weak encryption algorithm for data in Ps_security.ini, which makes it easier for local users to discover passwords by reading this file. Siemens ProcessSuite/Invensys Wonderware InTouch is the distributed control system \"APACS\". ProcessSuite is mostly used in manufacturing, oil and gas, and chemical fields. InTouch is an HMI software. Since the user management system containing the password is stored in the file \"Ps_security.ini\" in a reversible format, users with read access can exploit this vulnerability to obtain password information and log in as a privileged user, affecting system integrity, availability, and confidentiality. Successful attacks can allow a local attacker to gain unauthorized access to the password file. Information obtained may lead to further attacks

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201212-0033",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "processsuite",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "processsuite",
        "scope": null,
        "trust": 1.4,
        "vendor": "siemens",
        "version": null
      },
      {
        "model": "wonderware intouch",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "2012"
      },
      {
        "model": "intouch",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "2012 r2"
      },
      {
        "model": "intouch r2",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "wonderware",
        "version": "\u003c=2012"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "wonderware intouch",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "processsuite",
        "version": null
      },
      {
        "model": "processsuite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "siemens",
        "version": "0"
      },
      {
        "model": "wonderware intouch r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "invensys",
        "version": "2012"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "2bdb356a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "2d9d0cc0-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7479"
      },
      {
        "db": "BID",
        "id": "56934"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005760"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-204"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4693"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:invensys:intouch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:siemens:processsuite",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005760"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Seth Bromberger of NCI Security",
    "sources": [
      {
        "db": "BID",
        "id": "56934"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-204"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2012-4693",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.4,
            "id": "CVE-2012-4693",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.8,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.4,
            "id": "2bdb356a-2353-11e6-abef-000c29c66e3d",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.2,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.4,
            "id": "2d9d0cc0-2353-11e6-abef-000c29c66e3d",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.2,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.4,
            "id": "VHN-57974",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:M/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-4693",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-4693",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201212-204",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "IVD",
            "id": "2bdb356a-2353-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "LOW"
          },
          {
            "author": "IVD",
            "id": "2d9d0cc0-2353-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-57974",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "2bdb356a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "2d9d0cc0-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57974"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005760"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-204"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4693"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Invensys Wonderware InTouch 2012 R2 and earlier and Siemens ProcessSuite use a weak encryption algorithm for data in Ps_security.ini, which makes it easier for local users to discover passwords by reading this file. Siemens ProcessSuite/Invensys Wonderware InTouch is the distributed control system \\\"APACS\\\". ProcessSuite is mostly used in manufacturing, oil and gas, and chemical fields. InTouch is an HMI software. Since the user management system containing the password is stored in the file \\\"Ps_security.ini\\\" in a reversible format, users with read access can exploit this vulnerability to obtain password information and log in as a privileged user, affecting system integrity, availability, and confidentiality. \nSuccessful attacks can allow a local attacker to gain unauthorized access to the password file. Information obtained may lead to further attacks",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-4693"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005760"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7479"
      },
      {
        "db": "BID",
        "id": "56934"
      },
      {
        "db": "IVD",
        "id": "2bdb356a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "2d9d0cc0-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57974"
      }
    ],
    "trust": 2.88
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-4693",
        "trust": 3.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-12-348-01",
        "trust": 3.1
      },
      {
        "db": "SIEMENS",
        "id": "SSA-370812",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-204",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7479",
        "trust": 1.0
      },
      {
        "db": "BID",
        "id": "56934",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005760",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "2BDB356A-2353-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "2D9D0CC0-2353-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-57974",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "2bdb356a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "2d9d0cc0-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7479"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57974"
      },
      {
        "db": "BID",
        "id": "56934"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005760"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-204"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4693"
      }
    ]
  },
  "id": "VAR-201212-0033",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "2bdb356a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "2d9d0cc0-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7479"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57974"
      }
    ],
    "trust": 1.74760684
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "2bdb356a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "2d9d0cc0-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7479"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:55:45.874000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://iom.invensys.com/EN/Pages/home.aspx"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.siemens.com/entry/cc/en/"
      },
      {
        "title": "SSA-370812: Insecure Password Storage in Siemens ProcessSuite (discontinued product)",
        "trust": 0.8,
        "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-370812.pdf"
      },
      {
        "title": "Wonderware \u65e5\u672c\u306e\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://global.wonderware.com/JP/Pages/JpPartnersSI.aspx"
      },
      {
        "title": "\u30b7\u30fc\u30e1\u30f3\u30b9\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://www.automation.siemens.com/automation/jp/ja/solutionpartner/pages/default.aspx"
      },
      {
        "title": "\u30b7\u30fc\u30e1\u30f3\u30b9\u30fb\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e",
        "trust": 0.8,
        "url": "http://www.siemens.com/answers/jp/ja/"
      },
      {
        "title": "Wonderware Top Page",
        "trust": 0.8,
        "url": "http://global.wonderware.com/JP/pages/default.aspx"
      },
      {
        "title": "Siemens ProcessSuite/Invensys Wonderware InTouch Local Information Disclosure Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/26553"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7479"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005760"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-57974"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005760"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4693"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-348-01.pdf"
      },
      {
        "trust": 1.7,
        "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-370812.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4693"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4693"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/56934"
      },
      {
        "trust": 0.3,
        "url": "http://subscriber.communications.siemens.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7479"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57974"
      },
      {
        "db": "BID",
        "id": "56934"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005760"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-204"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4693"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "2bdb356a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "2d9d0cc0-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7479"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57974"
      },
      {
        "db": "BID",
        "id": "56934"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005760"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-204"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-4693"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-12-17T00:00:00",
        "db": "IVD",
        "id": "2bdb356a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2012-12-17T00:00:00",
        "db": "IVD",
        "id": "2d9d0cc0-2353-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2012-12-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-7479"
      },
      {
        "date": "2012-12-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-57974"
      },
      {
        "date": "2012-12-13T00:00:00",
        "db": "BID",
        "id": "56934"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-005760"
      },
      {
        "date": "2012-12-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201212-204"
      },
      {
        "date": "2012-12-18T12:30:05.857000",
        "db": "NVD",
        "id": "CVE-2012-4693"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-12-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-7479"
      },
      {
        "date": "2012-12-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-57974"
      },
      {
        "date": "2012-12-13T00:00:00",
        "db": "BID",
        "id": "56934"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-005760"
      },
      {
        "date": "2012-12-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201212-204"
      },
      {
        "date": "2024-11-21T01:43:22.090000",
        "db": "NVD",
        "id": "CVE-2012-4693"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "56934"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-204"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Siemens ProcessSuite/Invensys Wonderware InTouch Local Information Disclosure Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "2bdb356a-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "2d9d0cc0-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7479"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-204"
      }
    ],
    "trust": 1.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-204"
      }
    ],
    "trust": 0.6
  }
}

var-201207-0299
Vulnerability from variot

slssvc.exe in Invensys Wonderware SuiteLink in Invensys InTouch 2012 and Wonderware Application Server 2012 allows remote attackers to cause a denial of service (resource consumption) via a long Unicode string, a different vulnerability than CVE-2012-3007. WonderWare is an industrial control and automation software. ----------------------------------------------------------------------

Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch


TITLE: Invensys Wonderware InTouch SuiteLink Service Denial of Service Vulnerability

SECUNIA ADVISORY ID: SA49173

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49173/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49173

RELEASE DATE: 2012-05-16

DISCUSS ADVISORY: http://secunia.com/advisories/49173/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/49173/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=49173

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: Luigi Auriemma has discovered a vulnerability in Invensys Wonderware InTouch, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the SuiteLink Service (slssvc.exe) when processing certain packets. This can be exploited to cause the service to crash via a specially crafted packet sent to TCP port 5413.

The vulnerability is confirmed in version 10.1.300 Build 0268 (slssvc.exe version 51.5.0.0). Other versions may also be affected.

SOLUTION: Restrict access to trusted hosts only.

PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma

ORIGINAL ADVISORY: Luigi Auriemma: http://aluigi.altervista.org/adv/suitelink_1-adv.txt

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201207-0299",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "intouch",
        "scope": "eq",
        "trust": 3.0,
        "vendor": "invensys",
        "version": "2012"
      },
      {
        "model": "wonderware application server",
        "scope": "eq",
        "trust": 3.0,
        "vendor": "invensys",
        "version": "2012"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "intouch",
        "version": "2012"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware application server",
        "version": "2012"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b181e088-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3547"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003016"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-050"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3847"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:invensys:intouch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:wonderware_application_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003016"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Secunia",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "112815"
      }
    ],
    "trust": 0.1
  },
  "cve": "CVE-2012-3847",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2012-3847",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "b181e088-2353-11e6-abef-000c29c66e3d",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-57128",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-3847",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-3847",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201207-050",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "b181e088-2353-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-57128",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b181e088-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57128"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003016"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-050"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3847"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "slssvc.exe in Invensys Wonderware SuiteLink in Invensys InTouch 2012 and Wonderware Application Server 2012 allows remote attackers to cause a denial of service (resource consumption) via a long Unicode string, a different vulnerability than CVE-2012-3007. WonderWare is an industrial control and automation software. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nInvensys Wonderware InTouch SuiteLink Service Denial of Service\nVulnerability\n\nSECUNIA ADVISORY ID:\nSA49173\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49173/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49173\n\nRELEASE DATE:\n2012-05-16\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49173/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49173/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49173\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nLuigi Auriemma has discovered a vulnerability in Invensys Wonderware\nInTouch, which can be exploited by malicious people to cause a DoS\n(Denial of Service). \n\nThe vulnerability is caused due to an error within the SuiteLink\nService (slssvc.exe) when processing certain packets. This can be\nexploited to cause the service to crash via a specially crafted\npacket sent to TCP port 5413. \n\nThe vulnerability is confirmed in version 10.1.300 Build 0268\n(slssvc.exe version 51.5.0.0). Other versions may also be affected. \n\nSOLUTION:\nRestrict access to trusted hosts only. \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nLuigi Auriemma:\nhttp://aluigi.altervista.org/adv/suitelink_1-adv.txt\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-3847"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003016"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3547"
      },
      {
        "db": "IVD",
        "id": "b181e088-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57128"
      },
      {
        "db": "PACKETSTORM",
        "id": "112815"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-3847",
        "trust": 3.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-12-171-01",
        "trust": 3.1
      },
      {
        "db": "SECUNIA",
        "id": "49173",
        "trust": 1.2
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-050",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3547",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003016",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "B181E088-2353-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-57128",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "112815",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b181e088-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3547"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57128"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003016"
      },
      {
        "db": "PACKETSTORM",
        "id": "112815"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-050"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3847"
      }
    ]
  },
  "id": "VAR-201207-0299",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "b181e088-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3547"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57128"
      }
    ],
    "trust": 1.5072797000000002
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b181e088-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3547"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:46:17.263000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SuiteLink Service (SLSSVC) Vulnerability (LFSEC 00000038 - UPDATED)",
        "trust": 0.8,
        "url": "http://iom.invensys.com/EN/pdfLibrary/Security_Bulletin_LFSEC00000038.pdf"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://global.wonderware.com/"
      },
      {
        "title": "Wonderware \u65e5\u672c\u306e\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://global.wonderware.com/JP/Pages/JpPartnersSI.aspx"
      },
      {
        "title": "Wonderware Top Page",
        "trust": 0.8,
        "url": "http://global.wonderware.com/JP/pages/default.aspx"
      },
      {
        "title": "Patch for Invensys Wonderware SuiteLink Denial of Service Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/18633"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3547"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003016"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-399",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-57128"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003016"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3847"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-171-01.pdf"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/49173"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3847"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3847"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/psi_30_beta_launch"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49173"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/suitelink_1-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/49173/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/49173/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3547"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57128"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003016"
      },
      {
        "db": "PACKETSTORM",
        "id": "112815"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-050"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3847"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "b181e088-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3547"
      },
      {
        "db": "VULHUB",
        "id": "VHN-57128"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003016"
      },
      {
        "db": "PACKETSTORM",
        "id": "112815"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-050"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3847"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-07-09T00:00:00",
        "db": "IVD",
        "id": "b181e088-2353-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2012-07-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-3547"
      },
      {
        "date": "2012-07-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-57128"
      },
      {
        "date": "2012-07-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-003016"
      },
      {
        "date": "2012-05-17T11:19:10",
        "db": "PACKETSTORM",
        "id": "112815"
      },
      {
        "date": "2012-07-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201207-050"
      },
      {
        "date": "2012-07-05T03:23:18.683000",
        "db": "NVD",
        "id": "CVE-2012-3847"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-07-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-3547"
      },
      {
        "date": "2012-08-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-57128"
      },
      {
        "date": "2012-07-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-003016"
      },
      {
        "date": "2012-07-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201207-050"
      },
      {
        "date": "2024-11-21T01:41:45.030000",
        "db": "NVD",
        "id": "CVE-2012-3847"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-050"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Invensys Wonderware SuiteLink Denial of service vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "b181e088-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3547"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Resource management error",
    "sources": [
      {
        "db": "IVD",
        "id": "b181e088-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-050"
      }
    ],
    "trust": 0.8
  }
}

var-201204-0164
Vulnerability from variot

Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the AddFile member. Invensys is a leading provider of automation and information technology, systems, software solutions, services and consulting for the manufacturing and infrastructure industries. Multiple Invensys products are prone to multiple heap-based buffer-overflow vulnerabilities. Attackers may exploit these issues to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. ----------------------------------------------------------------------

Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch


TITLE: Invensys Products ActiveX Control Buffer Overflow Vulnerabilities

SECUNIA ADVISORY ID: SA48675

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48675/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48675

RELEASE DATE: 2012-04-02

DISCUSS ADVISORY: http://secunia.com/advisories/48675/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/48675/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=48675

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: Two vulnerabilities have been reported in Invensys products, which can be exploited by malicious people to compromise a user's system.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code. * Invensys Wonderware InTouch versions 10.0 through 10.5.

SOLUTION: Install patch. Please see the vendor's advisory for more information.

PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Celil Unuver, SignalSec Corporation.

ORIGINAL ADVISORY: ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf

Wonderware (requires login): https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201204-0164",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "intouch",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "invensys",
        "version": "10.0"
      },
      {
        "model": "intouch",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "invensys",
        "version": "10.5"
      },
      {
        "model": "archestra application object toolkit",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "3.2"
      },
      {
        "model": "foxboro control software",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "3.1"
      },
      {
        "model": "infusion control edition",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": "infusion foundation edition",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": "infusion scada",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": "wonderware application server",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "2012"
      },
      {
        "model": "wonderware information server",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "invensys",
        "version": "4.5"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "4.0"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 1.5,
        "vendor": "invensys",
        "version": "4.5"
      },
      {
        "model": "archestra application object toolkit",
        "scope": "eq",
        "trust": 1.5,
        "vendor": "invensys",
        "version": "3.2"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "3.1"
      },
      {
        "model": "wonderware application server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "invensys",
        "version": "20120"
      },
      {
        "model": "infusion ce/fe/scada",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": "foxboro control software",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "invensys",
        "version": "3.1"
      },
      {
        "model": "intouch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "10.0 to  10.5"
      },
      {
        "model": "wonderware application server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2012"
      },
      {
        "model": "infusion control edition",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": "infusion scada",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": "infusion foundation edition",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "2.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "wonderware information server",
        "version": "4.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "archestra application object toolkit",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "foxboro control",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "infusion control edition",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "infusion edition",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "infusion scada",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "intouch",
        "version": "10.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "intouch",
        "version": "10.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware application server",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware information server",
        "version": "3.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware information server",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "f9a8b710-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1691"
      },
      {
        "db": "BID",
        "id": "52835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001988"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-597"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0258"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:invensys:archestra_application_object_toolkit",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:foxboro_control_software",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:infusion_control_edition",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:infusion_foundation_edition",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:infusion_scada",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:intouch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:wonderware_application_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:wonderware_information_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001988"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Celil Unuver of SignalSec Corporation",
    "sources": [
      {
        "db": "BID",
        "id": "52835"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-597"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2012-0258",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2012-0258",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "f9a8b710-2353-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-53539",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-0258",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-0258",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201203-597",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "f9a8b710-2353-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-53539",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "f9a8b710-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53539"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001988"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-597"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0258"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the AddFile member. Invensys is a leading provider of automation and information technology, systems, software solutions, services and consulting for the manufacturing and infrastructure industries. Multiple Invensys products are prone to multiple heap-based buffer-overflow vulnerabilities. \nAttackers may exploit these issues to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nInvensys Products ActiveX Control Buffer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA48675\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/48675/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48675\n\nRELEASE DATE:\n2012-04-02\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/48675/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/48675/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48675\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nTwo vulnerabilities have been reported in Invensys products, which\ncan be exploited by malicious people to compromise a user\u0027s system. \n\nSuccessful exploitation of the vulnerabilities may allow execution of\narbitrary code. \n* Invensys Wonderware InTouch versions 10.0 through 10.5. \n\nSOLUTION:\nInstall patch. Please see the vendor\u0027s advisory for more information. \n\nPROVIDED AND/OR DISCOVERED BY:\nICS-CERT credits Celil Unuver, SignalSec Corporation. \n\nORIGINAL ADVISORY:\nICS-CERT:\nhttp://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf\n\nWonderware (requires login):\nhttps://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-0258"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001988"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1691"
      },
      {
        "db": "BID",
        "id": "52835"
      },
      {
        "db": "IVD",
        "id": "f9a8b710-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53539"
      },
      {
        "db": "PACKETSTORM",
        "id": "111462"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-0258",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-12-081-01",
        "trust": 3.5
      },
      {
        "db": "SECUNIA",
        "id": "48675",
        "trust": 1.9
      },
      {
        "db": "OSVDB",
        "id": "80891",
        "trust": 1.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-597",
        "trust": 0.9
      },
      {
        "db": "BID",
        "id": "52835",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1691",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001988",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "F9A8B710-2353-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-53539",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "111462",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "f9a8b710-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1691"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53539"
      },
      {
        "db": "BID",
        "id": "52835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001988"
      },
      {
        "db": "PACKETSTORM",
        "id": "111462"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-597"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0258"
      }
    ]
  },
  "id": "VAR-201204-0164",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "f9a8b710-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1691"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53539"
      }
    ],
    "trust": 1.5170465000000002
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "f9a8b710-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1691"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:31:33.024000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://global.wonderware.com/EN/Pages/default.aspx"
      },
      {
        "title": "\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u30fb\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://iom.invensys.com/JP/Pages/IOM_HardwarePartners.aspx"
      },
      {
        "title": "\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30fb\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://iom.invensys.com/JP/Pages/IOM_SoftwarePartners.aspx"
      },
      {
        "title": "Wonderware \u65e5\u672c\u306e\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://global.wonderware.com/JP/Pages/JpPartnersSI.aspx"
      },
      {
        "title": "Wonderware Top Page",
        "trust": 0.8,
        "url": "http://iom.invensys.com/JP/Pages/home.aspx"
      },
      {
        "title": "Patch for Multiple Invensys Products Remote Heap Buffer Overflow Vulnerability (CNVD-2012-1691)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/15179"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-1691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001988"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-53539"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001988"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0258"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.5,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-081-01.pdf"
      },
      {
        "trust": 1.8,
        "url": "https://wdnresource.wonderware.com/support/docs/_securitybulletins/security_bulletin_lfsec00000071.pdf"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/48675"
      },
      {
        "trust": 1.1,
        "url": "http://osvdb.org/80891"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0258"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0258"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/52835"
      },
      {
        "trust": 0.3,
        "url": "http://global.wonderware.com/en/pages/default.aspx"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/48675/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/psi_30_beta_launch"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/48675/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48675"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-1691"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53539"
      },
      {
        "db": "BID",
        "id": "52835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001988"
      },
      {
        "db": "PACKETSTORM",
        "id": "111462"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-597"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0258"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "f9a8b710-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-1691"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53539"
      },
      {
        "db": "BID",
        "id": "52835"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001988"
      },
      {
        "db": "PACKETSTORM",
        "id": "111462"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-597"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0258"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-04-01T00:00:00",
        "db": "IVD",
        "id": "f9a8b710-2353-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2012-04-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-1691"
      },
      {
        "date": "2012-04-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-53539"
      },
      {
        "date": "2012-03-30T00:00:00",
        "db": "BID",
        "id": "52835"
      },
      {
        "date": "2012-04-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-001988"
      },
      {
        "date": "2012-04-02T05:26:16",
        "db": "PACKETSTORM",
        "id": "111462"
      },
      {
        "date": "2012-03-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201203-597"
      },
      {
        "date": "2012-04-02T20:55:02.230000",
        "db": "NVD",
        "id": "CVE-2012-0258"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-04-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-1691"
      },
      {
        "date": "2013-03-26T00:00:00",
        "db": "VULHUB",
        "id": "VHN-53539"
      },
      {
        "date": "2012-03-30T00:00:00",
        "db": "BID",
        "id": "52835"
      },
      {
        "date": "2012-04-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-001988"
      },
      {
        "date": "2012-04-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201203-597"
      },
      {
        "date": "2024-11-21T01:34:40.547000",
        "db": "NVD",
        "id": "CVE-2012-0258"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-597"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Invensys Heap-based buffer overflow vulnerability in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-001988"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "f9a8b710-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201203-597"
      }
    ],
    "trust": 0.8
  }
}