Vulnerabilites related to wellintech - kingview
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | 6.53 | |
wellintech | kingview | 65.30.2010.18018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:6.53:*:*:*:*:*:*:*", "matchCriteriaId": "C256036A-9428-4BD3-BB8D-0192EB219764", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "1DAAC197-9039-4D12-A4B0-7A534E3A1B59", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nettransdll.dll in HistorySvr.exe (aka HistoryServer.exe) in WellinTech KingView 6.53 and 65.30.2010.18018 allows remote attackers to execute arbitrary code via a crafted op-code 3 packet." }, { "lang": "es", "value": "Desbordamiento de buffer de memoria din\u00e1mica en nettransdll.dll en HistorySvr.exe (tambi\u00e9n conocido como HistoryServer.exe) en WellinTech KingView v6.53 y 65.30.2010.18018 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un paquete manipulado \u0027op-code 3\u0027." } ], "id": "CVE-2011-4536", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-27T04:01:39.857", "references": [ { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=166" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47339" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=587" }, { "source": "cret@cert.org", "url": "http://www.osvdb.org/77992" }, { "source": "cret@cert.org", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf" }, { "source": "cret@cert.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-351/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47339" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=587" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/77992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-351/" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | 6.53 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:6.53:*:*:*:*:*:*:*", "matchCriteriaId": "C256036A-9428-4BD3-BB8D-0192EB219764", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in WellinTech KingView 6.53 allows local users to gain privileges via a Trojan horse DLL in the current working directory." }, { "lang": "es", "value": "Vulnerabilidad de ruta de b\u00fasqueda no confiable en WellinTech KingView v6.53 permite a usuarios locales conseguir privilegios a trav\u00e9s de un caballo de Troya DLL en el directorio de trabajo actual." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/lists/426.html\r\n\r\n\u0027Untrusted Search Path\u0027", "evaluatorImpact": "Per: http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf\r\n\r\n\u0027This vulnerability is remotely exploitable but may require the use of social engineering to exploit.\u0027", "id": "CVE-2012-1819", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-02T22:55:02.140", "references": [ { "source": "cret@cert.org", "tags": [ "Patch" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=168" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/53316" }, { "source": "cret@cert.org", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf" }, { "source": "cret@cert.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75309" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | * | |
wellintech | kingview | 3.0 | |
wellintech | kingview | 6.52 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B19F35-84B4-45AE-96D9-352213070CBC", "versionEndIncluding": "6.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAB5609B-2D1E-42F5-9C78-1460A21C8795", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SUPERGRIDLib.SuperGrid ActiveX control in SuperGrid.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict ReplaceDBFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the two pathname arguments, as demonstrated by a directory traversal attack." }, { "lang": "es", "value": "El control SUPERGRIDLib.SuperGrid ActiveX en SuperGrid.ocx anterior a la versi\u00f3n 65.30.30000.10002 de WellinTech KingView anterior a la versi\u00f3n 6.53 no restringe adecuadamente los m\u00e9todos de llamada ReplaceDBFile, lo que permite a atacantes remotos crear y sobreescribir archivos arbitrarios, y posteriormente ejecutar programas arbitrarios, a trav\u00e9s de dos argumentos pathname, como lo demuestra un ataque de recorrido de directorio." } ], "id": "CVE-2013-6127", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-10-25T20:55:03.500", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/28084/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/28084/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4C15589-36E2-41B9-AE71-989CABF8B374", "versionEndIncluding": "6.52", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The KCHARTXYLib.KChartXY ActiveX control in KChartXY.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict SaveToFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the single pathname argument, as demonstrated by a directory traversal attack." }, { "lang": "es", "value": "El control ActiveX KCHARTXYLib.KChartXY en KChartXY.ocx anterior a 6.53 no restringe apropiadamente las llamadas al m\u00e9todo SaveToFile, lo que permite a atacantes remotos crear o sobreecribir archivos a discrecci\u00f3n, y subsecuentemente ejecutar programas de forma arbitraria, a traves de un argumento de ruta simple, como fue demostrado por un ataque de recorrido de directorios." } ], "id": "CVE-2013-6128", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-10-25T20:55:03.517", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Patch", "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" }, { "source": "ics-cert@hq.dhs.gov", "url": "http://www.exploit-db.com/exploits/28085/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/28085/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | 6.52 | |
wellintech | kingview | 6.53 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.53:*:*:*:*:*:*:*", "matchCriteriaId": "C256036A-9428-4BD3-BB8D-0192EB219764", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in an ActiveX control in KVWebSvr.dll in WellinTech KingView 6.52 and 6.53 allows remote attackers to execute arbitrary code via a long second argument to the ValidateUser method." }, { "lang": "es", "value": "Desbordamiento de buffer de pila en un control ActiveX de KVWebSvr.dll de WellinTech KingView 6.52 y 6.53 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un argumento segundo extenso al m\u00e9todo ValidateUser." } ], "id": "CVE-2011-3142", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-16T21:55:01.273", "references": [ { "source": "cve@mitre.org", "url": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-04541" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/16936" }, { "source": "cve@mitre.org", "url": "http://www.kingview.com/news/detail.aspx?contentid=537" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/72889" }, { "source": "cve@mitre.org", "url": "http://www.scadahacker.com/exploits-wellintech-kvwebsvr.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/46757" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-066-01.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-074-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-04541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/16936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kingview.com/news/detail.aspx?contentid=537" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/72889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.scadahacker.com/exploits-wellintech-kvwebsvr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/46757" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-066-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-074-01.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | 3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAB5609B-2D1E-42F5-9C78-1460A21C8795", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent attackers to obtain sensitive information by reading this file." }, { "lang": "es", "value": "WellinTech KingSCADA 3.0 utiliza un formato base64 en texto claro para el almacenamiento de contrase\u00f1as en user.db, lo que permite a atacantes locales o remotos obtener informaci\u00f3n sensible mediante la lectura de este archivo." } ], "id": "CVE-2012-1977", "lastModified": "2025-06-26T22:15:24.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "ics-cert@hq.dhs.gov", "type": "Secondary", "userInteractionRequired": false }, { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-09T10:33:15.020", "references": [ { "source": "ics-cert@hq.dhs.gov", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-12-129-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dsecrg.com/pages/vul/show.php?id=405" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-129-01.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-311" } ], "source": "ics-cert@hq.dhs.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | Patch, US Government Resource | |
cret@cert.org | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | Patch, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | * | |
wellintech | kingview | 3.0 | |
wellintech | kingview | 6.5.30.2010.18018 | |
wellintech | kingview | 6.52 | |
wellintech | kingview | 65.30.2010.18018 | |
wellintech | kingview | 65.30.17249 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B19F35-84B4-45AE-96D9-352213070CBC", "versionEndIncluding": "6.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAB5609B-2D1E-42F5-9C78-1460A21C8795", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.5.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "F98B1909-52F3-42C7-AF6B-FE5EC1FB1657", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "1DAAC197-9039-4D12-A4B0-7A534E3A1B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.17249:*:*:*:*:*:*:*", "matchCriteriaId": "5161BBEA-1BA5-4FF1-9D8A-52D6C7BE2282", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en memoria din\u00e1mica en WellinTech KingView v6.53, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de paquetes modificados al puerto TCP 555." } ], "id": "CVE-2012-1831", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-05T03:23:18.277", "references": [ { "source": "cret@cert.org", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | Patch, Vendor Advisory | |
cret@cert.org | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | * | |
wellintech | kingview | 3.0 | |
wellintech | kingview | 6.5.30.2010.18018 | |
wellintech | kingview | 6.52 | |
wellintech | kingview | 65.30.2010.18018 | |
wellintech | kingview | 65.30.17249 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B19F35-84B4-45AE-96D9-352213070CBC", "versionEndIncluding": "6.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAB5609B-2D1E-42F5-9C78-1460A21C8795", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.5.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "F98B1909-52F3-42C7-AF6B-FE5EC1FB1657", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "1DAAC197-9039-4D12-A4B0-7A534E3A1B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.17249:*:*:*:*:*:*:*", "matchCriteriaId": "5161BBEA-1BA5-4FF1-9D8A-52D6C7BE2282", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en WellinTech KingView v6.53, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de paquetes modificados al puerto TCP 555." } ], "evaluatorImpact": "Per: http://www.wellintech.com/index.php/news/33-patch-for-kingview653\r\n\r\n\"KingView with the version 65.30.17249( TouchExplorer: 65.30.2003.17249; TouchVew: 65.30.2003.17376) and also the previous version is affected.\"", "id": "CVE-2012-1830", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-05T03:23:18.230", "references": [ { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf | US Government Resource | |
cve@mitre.org | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | * | |
wellintech | kingview | 3.0 | |
wellintech | kingview | 6.5.30.2010.18018 | |
wellintech | kingview | 6.52 | |
wellintech | kingview | 65.30.2010.18018 | |
wellintech | kingview | 65.30.17249 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B19F35-84B4-45AE-96D9-352213070CBC", "versionEndIncluding": "6.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAB5609B-2D1E-42F5-9C78-1460A21C8795", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.5.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "F98B1909-52F3-42C7-AF6B-FE5EC1FB1657", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "1DAAC197-9039-4D12-A4B0-7A534E3A1B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.17249:*:*:*:*:*:*:*", "matchCriteriaId": "5161BBEA-1BA5-4FF1-9D8A-52D6C7BE2282", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WellinTech KingView 6.5.3 and earlier uses a weak password-hashing algorithm, which makes it easier for local users to discover credentials by reading an unspecified file." }, { "lang": "es", "value": "WellinTech KingView6.5.3 y anterior utiliza algoritmo d\u00e9bil de generaci\u00f3n de contrase\u00f1as, lo que hace que sea m\u00e1s f\u00e1cil para los usuarios locales descubrir credenciales mediante la lectura de un archivo especificado." } ], "id": "CVE-2012-4899", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-10T18:55:05.550", "references": [ { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | US Government Resource | |
cret@cert.org | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | * | |
wellintech | kingview | 3.0 | |
wellintech | kingview | 6.5.30.2010.18018 | |
wellintech | kingview | 6.52 | |
wellintech | kingview | 65.30.2010.18018 | |
wellintech | kingview | 65.30.17249 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B19F35-84B4-45AE-96D9-352213070CBC", "versionEndIncluding": "6.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAB5609B-2D1E-42F5-9C78-1460A21C8795", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.5.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "F98B1909-52F3-42C7-AF6B-FE5EC1FB1657", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "1DAAC197-9039-4D12-A4B0-7A534E3A1B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.17249:*:*:*:*:*:*:*", "matchCriteriaId": "5161BBEA-1BA5-4FF1-9D8A-52D6C7BE2282", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in WellinTech KingView 6.53 allows remote attackers to read arbitrary files via a crafted HTTP request to port 8001." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en WellinTech KingView v6.53, permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de peticiones HTTP al puerto 8001 modificadas." } ], "id": "CVE-2012-2560", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-05T03:23:18.603", "references": [ { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | 6.52 | |
wellintech | kingview | 6.53 | |
wellintech | kingview | 6.55 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.53:*:*:*:*:*:*:*", "matchCriteriaId": "C256036A-9428-4BD3-BB8D-0192EB219764", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.55:*:*:*:*:*:*:*", "matchCriteriaId": "C657AF50-F338-42FB-80B8-B8B8A7E7AE20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet." }, { "lang": "es", "value": "Desbordamiento de buffer en kingMess.exe v65.20.2003.10300 en WellinTech KingView v6.52, kingMess.exe v65.20.2003.10400 en KingView v6.53, y kingMess.exe v65.50.2011.18049 en KingView v6.55 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (por corrupci\u00f3n de la memoria) mediante un paquete manipulado." } ], "id": "CVE-2012-4711", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-15T12:09:27.820", "references": [ { "source": "ics-cert@hq.dhs.gov", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-043-02A" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-043-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-043-02A" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-043-02.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | Patch, US Government Resource | |
cret@cert.org | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | Patch, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | * | |
wellintech | kingview | 3.0 | |
wellintech | kingview | 6.5.30.2010.18018 | |
wellintech | kingview | 6.52 | |
wellintech | kingview | 65.30.2010.18018 | |
wellintech | kingview | 65.30.17249 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B19F35-84B4-45AE-96D9-352213070CBC", "versionEndIncluding": "6.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAB5609B-2D1E-42F5-9C78-1460A21C8795", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.5.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "F98B1909-52F3-42C7-AF6B-FE5EC1FB1657", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "1DAAC197-9039-4D12-A4B0-7A534E3A1B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.17249:*:*:*:*:*:*:*", "matchCriteriaId": "5161BBEA-1BA5-4FF1-9D8A-52D6C7BE2282", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WellinTech KingView 6.53 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted packet to (1) TCP or (2) UDP port 2001." }, { "lang": "es", "value": "WellinTech KingView v6.53, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (lectura fuera de l\u00edmites) a trav\u00e9s de un paquete modificado al puerto 2001 (1) TCP o (2) UDP" } ], "id": "CVE-2012-1832", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-05T03:23:18.323", "references": [ { "source": "cret@cert.org", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | 6.53 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:6.53:*:*:*:*:*:*:*", "matchCriteriaId": "C256036A-9428-4BD3-BB8D-0192EB219764", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in HistorySvr.exe in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a long request to TCP port 777." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en el mont\u00f3n en HistorySvr.exe en WellinTech KingView v6.53 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante una petici\u00f3n larga al puerto TCP 777." } ], "id": "CVE-2011-0406", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-11T03:00:06.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/70366" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42851" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/8134" }, { "source": "cve@mitre.org", "url": "http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html" }, { "source": "cve@mitre.org", "url": "http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/15957" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/180119" }, { "source": "cve@mitre.org", "url": "http://www.kingview.com/news/detail.aspx?contentid=528" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/45727" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0063" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64559" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/70366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42851" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/15957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/180119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kingview.com/news/detail.aspx?contentid=528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/45727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64559" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201207-0381
Vulnerability from variot
WellinTech KingView 6.53 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted packet to (1) TCP or (2) UDP port 2001. KingView is a product for building data information service platforms for industrial automation. A security vulnerability exists in WellinTech KingView that allows an attacker to send a specially crafted message to the TCP 2001 or UPD 2001 port, which can trigger the reading of illegal memory domain data, causing the application to crash. WellinTech KingView is prone to multiple memory corruption vulnerabilities and a directory-traversal vulnerability. An attacker can exploit these issues to access arbitrary files within the context of the affected application and execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. WellinTech KingView 6.53 is vulnerable. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: KingHistorian Memory Corruption Vulnerability
SECUNIA ADVISORY ID: SA49765
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49765/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49765
RELEASE DATE: 2012-07-09
DISCUSS ADVISORY: http://secunia.com/advisories/49765/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/49765/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=49765
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in KingHistorian, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to an invalid pointer write error, which can be exploited to corrupt memory via a specially crafted packet sent to port 5678.
Successful exploitation may allow execution of arbitrary code.
The vulnerability is reported in version 3.0.
SOLUTION: Install patch.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Dillon Beresford.
ORIGINAL ADVISORY: ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201207-0381", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "eq", "trust": 2.3, "vendor": "wellintech", "version": "6.53" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "65.30.17249" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "65.30.2010.18018" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "6.5.30.2010.18018" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "3.0" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "6.52" }, { "model": "kingview", "scope": "lte", "trust": 1.0, "vendor": "wellintech", "version": "6.53" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "3.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "6.5.30.2010.18018" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "6.52" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "65.30.2010.18018" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "65.30.17249" } ], "sources": [ { "db": "IVD", "id": "b14cc34e-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3532" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003010" }, { "db": "CNNVD", "id": "CNNVD-201207-046" }, { "db": "NVD", "id": "CVE-2012-1832" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wellintech:kingview", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003010" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Carlos Mario Penagos Hollman and Dillon Beresford", "sources": [ { "db": "BID", "id": "54280" } ], "trust": 0.3 }, "cve": "CVE-2012-1832", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2012-1832", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "b14cc34e-2353-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1832", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2012-1832", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201207-046", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "b14cc34e-2353-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "b14cc34e-2353-11e6-abef-000c29c66e3d" }, { "db": "JVNDB", "id": "JVNDB-2012-003010" }, { "db": "CNNVD", "id": "CNNVD-201207-046" }, { "db": "NVD", "id": "CVE-2012-1832" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView 6.53 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted packet to (1) TCP or (2) UDP port 2001. KingView is a product for building data information service platforms for industrial automation. A security vulnerability exists in WellinTech KingView that allows an attacker to send a specially crafted message to the TCP 2001 or UPD 2001 port, which can trigger the reading of illegal memory domain data, causing the application to crash. WellinTech KingView is prone to multiple memory corruption vulnerabilities and a directory-traversal vulnerability. \nAn attacker can exploit these issues to access arbitrary files within the context of the affected application and execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. \nWellinTech KingView 6.53 is vulnerable. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nKingHistorian Memory Corruption Vulnerability\n\nSECUNIA ADVISORY ID:\nSA49765\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49765/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49765\n\nRELEASE DATE:\n2012-07-09\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49765/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49765/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49765\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in KingHistorian, which can be\nexploited by malicious people to compromise a vulnerable system. \n\nThe vulnerability is caused due to an invalid pointer write error,\nwhich can be exploited to corrupt memory via a specially crafted\npacket sent to port 5678. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\nThe vulnerability is reported in version 3.0. \n\nSOLUTION:\nInstall patch. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nICS-CERT credits Dillon Beresford. \n\nORIGINAL ADVISORY:\nICS-CERT:\nhttp://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-1832" }, { "db": "JVNDB", "id": "JVNDB-2012-003010" }, { "db": "CNVD", "id": "CNVD-2012-3532" }, { "db": "BID", "id": "54280" }, { "db": "IVD", "id": "b14cc34e-2353-11e6-abef-000c29c66e3d" }, { "db": "PACKETSTORM", "id": "114551" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1832", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-12-185-01", "trust": 3.1 }, { "db": "CNVD", "id": "CNVD-2012-3532", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201207-046", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-003010", "trust": 0.8 }, { "db": "BID", "id": "54280", "trust": 0.3 }, { "db": "IVD", "id": "B14CC34E-2353-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "SECUNIA", "id": "49765", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "114551", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "b14cc34e-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3532" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003010" }, { "db": "PACKETSTORM", "id": "114551" }, { "db": "CNNVD", "id": "CNNVD-201207-046" }, { "db": "NVD", "id": "CVE-2012-1832" } ] }, "id": "VAR-201207-0381", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "b14cc34e-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3532" } ], "trust": 1.3748106 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "b14cc34e-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3532" } ] }, "last_update_date": "2024-11-23T21:55:58.539000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Jun.27,2012 -Patch for KingView6.53", "trust": 0.8, "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.wellintech.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.wellintech.co.jp/" }, { "title": "WellinTech KingView illegal read vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/18572" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-3532" }, { "db": "JVNDB", "id": "JVNDB-2012-003010" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003010" }, { "db": "NVD", "id": "CVE-2012-1832" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-185-01.pdf" }, { "trust": 1.6, "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1832" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1832" }, { "trust": 0.3, "url": "http://www.kingview.com/" }, { "trust": 0.1, "url": "http://secunia.com/psi_30_beta_launch" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49765/#comments" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49765/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49765" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-3532" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003010" }, { "db": "PACKETSTORM", "id": "114551" }, { "db": "CNNVD", "id": "CNNVD-201207-046" }, { "db": "NVD", "id": "CVE-2012-1832" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "b14cc34e-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3532" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003010" }, { "db": "PACKETSTORM", "id": "114551" }, { "db": "CNNVD", "id": "CNNVD-201207-046" }, { "db": "NVD", "id": "CVE-2012-1832" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-07-09T00:00:00", "db": "IVD", "id": "b14cc34e-2353-11e6-abef-000c29c66e3d" }, { "date": "2012-07-09T00:00:00", "db": "CNVD", "id": "CNVD-2012-3532" }, { "date": "2012-07-03T00:00:00", "db": "BID", "id": "54280" }, { "date": "2012-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003010" }, { "date": "2012-07-09T03:48:55", "db": "PACKETSTORM", "id": "114551" }, { "date": "2012-07-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-046" }, { "date": "2012-07-05T03:23:18.323000", "db": "NVD", "id": "CVE-2012-1832" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2012-3532" }, { "date": "2015-03-19T09:08:00", "db": "BID", "id": "54280" }, { "date": "2012-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003010" }, { "date": "2012-07-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-046" }, { "date": "2024-11-21T01:37:51.930000", "db": "NVD", "id": "CVE-2012-1832" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201207-046" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003010" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "b14cc34e-2353-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201207-046" } ], "trust": 0.8 } }
var-201206-0420
Vulnerability from variot
KingView is a product for building data information service platforms for industrial automation. Kingview has a buffer overflow vulnerability. An attacker could exploit a vulnerability to execute arbitrary code in the context of an application. Kingview is prone to a network-based buffer-overflow vulnerability. Failed attacks will cause denial-of-service conditions. Kingview 6.53 is vulnerable; other versions may also be affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201206-0420", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "eq", "trust": 1.1, "vendor": "wellintech", "version": "6.53" } ], "sources": [ { "db": "IVD", "id": "59b362cc-1f62-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3380" }, { "db": "BID", "id": "54180" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Carlos Mario Penagos Hollmann", "sources": [ { "db": "BID", "id": "54180" }, { "db": "CNNVD", "id": "CNNVD-201210-760" } ], "trust": 0.9 }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "id": "59b362cc-1f62-11e6-abef-000c29c66e3d", "impactScore": 7.8, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:C", "version": "2.0 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "IVD", "id": "59b362cc-1f62-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "59b362cc-1f62-11e6-abef-000c29c66e3d" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "KingView is a product for building data information service platforms for industrial automation. Kingview has a buffer overflow vulnerability. An attacker could exploit a vulnerability to execute arbitrary code in the context of an application. Kingview is prone to a network-based buffer-overflow vulnerability. Failed attacks will cause denial-of-service conditions. \nKingview 6.53 is vulnerable; other versions may also be affected", "sources": [ { "db": "CNVD", "id": "CNVD-2012-3380" }, { "db": "BID", "id": "54180" }, { "db": "IVD", "id": "59b362cc-1f62-11e6-abef-000c29c66e3d" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "54180", "trust": 1.5 }, { "db": "CNVD", "id": "CNVD-2012-3380", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201210-760", "trust": 0.6 }, { "db": "IVD", "id": "59B362CC-1F62-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "59b362cc-1f62-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3380" }, { "db": "BID", "id": "54180" }, { "db": "CNNVD", "id": "CNNVD-201210-760" } ] }, "id": "VAR-201206-0420", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "59b362cc-1f62-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3380" } ], "trust": 1.3764423 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "59b362cc-1f62-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3380" } ] }, "last_update_date": "2022-05-17T02:04:43.716000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Kingview Network Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/18351" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-3380" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.2, "url": "http://www.securityfocus.com/bid/54180" }, { "trust": 0.3, "url": "http://www.kingview.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-3380" }, { "db": "BID", "id": "54180" }, { "db": "CNNVD", "id": "CNNVD-201210-760" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "59b362cc-1f62-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3380" }, { "db": "BID", "id": "54180" }, { "db": "CNNVD", "id": "CNNVD-201210-760" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-06-29T00:00:00", "db": "IVD", "id": "59b362cc-1f62-11e6-abef-000c29c66e3d" }, { "date": "2012-06-29T00:00:00", "db": "CNVD", "id": "CNVD-2012-3380" }, { "date": "2012-06-25T00:00:00", "db": "BID", "id": "54180" }, { "date": "2012-06-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201210-760" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2012-3380" }, { "date": "2012-06-25T00:00:00", "db": "BID", "id": "54180" }, { "date": "2012-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201210-760" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201210-760" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kingview Network Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "59b362cc-1f62-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3380" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "59b362cc-1f62-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201210-760" } ], "trust": 0.8 } }
var-201207-0059
Vulnerability from variot
Directory traversal vulnerability in WellinTech KingView 6.53 allows remote attackers to read arbitrary files via a crafted HTTP request to port 8001. KingView is a product for building data information service platforms for industrial automation. WellinTech KingView is prone to multiple memory corruption vulnerabilities and a directory-traversal vulnerability. An attacker can exploit these issues to access arbitrary files within the context of the affected application and execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. WellinTech KingView 6.53 is vulnerable. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: KingHistorian Memory Corruption Vulnerability
SECUNIA ADVISORY ID: SA49765
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49765/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49765
RELEASE DATE: 2012-07-09
DISCUSS ADVISORY: http://secunia.com/advisories/49765/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/49765/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=49765
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in KingHistorian, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to an invalid pointer write error, which can be exploited to corrupt memory via a specially crafted packet sent to port 5678.
Successful exploitation may allow execution of arbitrary code.
The vulnerability is reported in version 3.0.
SOLUTION: Install patch.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Dillon Beresford.
ORIGINAL ADVISORY: ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201207-0059", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "eq", "trust": 2.3, "vendor": "wellintech", "version": "6.53" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "65.30.17249" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "65.30.2010.18018" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "6.5.30.2010.18018" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "3.0" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "6.52" }, { "model": "kingview", "scope": "lte", "trust": 1.0, "vendor": "wellintech", "version": "6.53" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "3.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "6.5.30.2010.18018" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "6.52" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "65.30.2010.18018" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "65.30.17249" } ], "sources": [ { "db": "IVD", "id": "b18e8a7c-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3533" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003012" }, { "db": "CNNVD", "id": "CNNVD-201207-048" }, { "db": "NVD", "id": "CVE-2012-2560" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wellintech:kingview", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003012" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Carlos Mario Penagos Hollman and Dillon Beresford", "sources": [ { "db": "BID", "id": "54280" } ], "trust": 0.3 }, "cve": "CVE-2012-2560", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2012-2560", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "b18e8a7c-2353-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-2560", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-2560", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201207-048", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "b18e8a7c-2353-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "b18e8a7c-2353-11e6-abef-000c29c66e3d" }, { "db": "JVNDB", "id": "JVNDB-2012-003012" }, { "db": "CNNVD", "id": "CNNVD-201207-048" }, { "db": "NVD", "id": "CVE-2012-2560" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Directory traversal vulnerability in WellinTech KingView 6.53 allows remote attackers to read arbitrary files via a crafted HTTP request to port 8001. KingView is a product for building data information service platforms for industrial automation. WellinTech KingView is prone to multiple memory corruption vulnerabilities and a directory-traversal vulnerability. \nAn attacker can exploit these issues to access arbitrary files within the context of the affected application and execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. \nWellinTech KingView 6.53 is vulnerable. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nKingHistorian Memory Corruption Vulnerability\n\nSECUNIA ADVISORY ID:\nSA49765\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49765/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49765\n\nRELEASE DATE:\n2012-07-09\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49765/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49765/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49765\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in KingHistorian, which can be\nexploited by malicious people to compromise a vulnerable system. \n\nThe vulnerability is caused due to an invalid pointer write error,\nwhich can be exploited to corrupt memory via a specially crafted\npacket sent to port 5678. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\nThe vulnerability is reported in version 3.0. \n\nSOLUTION:\nInstall patch. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nICS-CERT credits Dillon Beresford. \n\nORIGINAL ADVISORY:\nICS-CERT:\nhttp://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-2560" }, { "db": "JVNDB", "id": "JVNDB-2012-003012" }, { "db": "CNVD", "id": "CNVD-2012-3533" }, { "db": "BID", "id": "54280" }, { "db": "IVD", "id": "b18e8a7c-2353-11e6-abef-000c29c66e3d" }, { "db": "PACKETSTORM", "id": "114551" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-2560", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-12-185-01", "trust": 3.1 }, { "db": "CNVD", "id": "CNVD-2012-3533", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201207-048", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-003012", "trust": 0.8 }, { "db": "BID", "id": "54280", "trust": 0.3 }, { "db": "IVD", "id": "B18E8A7C-2353-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "SECUNIA", "id": "49765", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "114551", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "b18e8a7c-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3533" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003012" }, { "db": "PACKETSTORM", "id": "114551" }, { "db": "CNNVD", "id": "CNNVD-201207-048" }, { "db": "NVD", "id": "CVE-2012-2560" } ] }, "id": "VAR-201207-0059", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "b18e8a7c-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3533" } ], "trust": 1.3748106 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "b18e8a7c-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3533" } ] }, "last_update_date": "2024-11-23T21:55:58.578000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Jun.27,2012 -Patch for KingView6.53", "trust": 0.8, "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "title": "Top Page", "trust": 0.8, "url": "http://en.wellintech.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.wellintech.co.jp/" }, { "title": "WellinTech KingView Path Traversal Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/18571" }, { "title": "KV20120322-EN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=43659" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-3533" }, { "db": "JVNDB", "id": "JVNDB-2012-003012" }, { "db": "CNNVD", "id": "CNNVD-201207-048" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003012" }, { "db": "NVD", "id": "CVE-2012-2560" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-185-01.pdf" }, { "trust": 1.6, "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2560" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2560" }, { "trust": 0.3, "url": "http://www.kingview.com/" }, { "trust": 0.1, "url": "http://secunia.com/psi_30_beta_launch" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49765/#comments" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49765/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49765" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-3533" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003012" }, { "db": "PACKETSTORM", "id": "114551" }, { "db": "CNNVD", "id": "CNNVD-201207-048" }, { "db": "NVD", "id": "CVE-2012-2560" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "b18e8a7c-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3533" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003012" }, { "db": "PACKETSTORM", "id": "114551" }, { "db": "CNNVD", "id": "CNNVD-201207-048" }, { "db": "NVD", "id": "CVE-2012-2560" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-07-09T00:00:00", "db": "IVD", "id": "b18e8a7c-2353-11e6-abef-000c29c66e3d" }, { "date": "2012-07-09T00:00:00", "db": "CNVD", "id": "CNVD-2012-3533" }, { "date": "2012-07-03T00:00:00", "db": "BID", "id": "54280" }, { "date": "2012-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003012" }, { "date": "2012-07-09T03:48:55", "db": "PACKETSTORM", "id": "114551" }, { "date": "2012-07-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-048" }, { "date": "2012-07-05T03:23:18.603000", "db": "NVD", "id": "CVE-2012-2560" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2012-3533" }, { "date": "2015-03-19T09:08:00", "db": "BID", "id": "54280" }, { "date": "2012-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003012" }, { "date": "2012-07-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-048" }, { "date": "2024-11-21T01:39:13.733000", "db": "NVD", "id": "CVE-2012-2560" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201207-048" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView Path traversal vulnerability", "sources": [ { "db": "IVD", "id": "b18e8a7c-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3533" }, { "db": "CNNVD", "id": "CNNVD-201207-048" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Path traversal", "sources": [ { "db": "IVD", "id": "b18e8a7c-2353-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201207-048" } ], "trust": 0.8 } }
var-201205-0515
Vulnerability from variot
WellinTech KingView is prone to a denial-of-service vulnerability and a directory-traversal vulnerability. Exploiting these issues may allow remote attackers to crash or access arbitrary files within the context of the affected application. KingView 65.30.17249 is vulnerable; other versions may also be affected.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201205-0515", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "eq", "trust": 0.3, "vendor": "wellintech", "version": "65.30.17249" } ], "sources": [ { "db": "BID", "id": "53370" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "anonymous via ICS-CERT", "sources": [ { "db": "BID", "id": "53370" }, { "db": "CNNVD", "id": "CNNVD-201205-082" } ], "trust": 0.9 }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView is prone to a denial-of-service vulnerability and a directory-traversal vulnerability.\nExploiting these issues may allow remote attackers to crash or access arbitrary files within the context of the affected application.\nKingView 65.30.17249 is vulnerable; other versions may also be affected.", "sources": [ { "db": "BID", "id": "53370" } ], "trust": 0.3 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "53370", "trust": 0.9 }, { "db": "CNNVD", "id": "CNNVD-201205-082", "trust": 0.6 } ], "sources": [ { "db": "BID", "id": "53370" }, { "db": "CNNVD", "id": "CNNVD-201205-082" } ] }, "id": "VAR-201205-0515", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.5764423 }, "last_update_date": "2022-05-17T01:56:34.967000Z", "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 0.6, "url": "http://www.securityfocus.com/bid/53370" }, { "trust": 0.3, "url": "http://www.kingview.com/" }, { "trust": 0.3, "url": "http://en.wellintech.com/news/detail.aspx?contentid=168" } ], "sources": [ { "db": "BID", "id": "53370" }, { "db": "CNNVD", "id": "CNNVD-201205-082" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "53370" }, { "db": "CNNVD", "id": "CNNVD-201205-082" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-05-03T00:00:00", "db": "BID", "id": "53370" }, { "date": "2012-05-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-082" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-05-03T00:00:00", "db": "BID", "id": "53370" }, { "date": "2012-05-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-082" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201205-082" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView Denial of Service Vulnerability and Directory Traversal Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-201205-082" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "53370" } ], "trust": 0.3 } }
var-201310-0626
Vulnerability from variot
The KCHARTXYLib.KChartXY ActiveX control in KChartXY.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict SaveToFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the single pathname argument, as demonstrated by a directory traversal attack. Kingview is the first SCADA product launched by Asia Control for small and medium-sized projects for monitoring and controlling automation equipment and processes. WellinTech KingView ActiveX has multiple arbitrary file coverage vulnerabilities. Because the program fails to properly filter user input, an attacker can exploit the vulnerability to save arbitrary files on the affected application context computer. WellinTech KingView is prone to multiple insecure-method vulnerabilities because it fails to properly sanitize user-supplied input. KingView 6.53 is vulnerable; other versions may also be affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0626", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "lte", "trust": 1.0, "vendor": "wellintech", "version": "6.52" }, { "model": "kingview", "scope": "eq", "trust": 0.9, "vendor": "wellintech", "version": "6.53" }, { "model": "kingview", "scope": "lt", "trust": 0.8, "vendor": "wellintech", "version": "6.53 (kchartxy.ocx 65.30.30000.10002 )" }, { "model": "kingview", "scope": "eq", "trust": 0.6, "vendor": "wellintech", "version": "6.52" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13162" }, { "db": "BID", "id": "62419" }, { "db": "JVNDB", "id": "JVNDB-2013-004902" }, { "db": "CNNVD", "id": "CNNVD-201310-514" }, { "db": "NVD", "id": "CVE-2013-6128" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wellintech:kingview", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004902" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Blake", "sources": [ { "db": "BID", "id": "62419" }, { "db": "CNNVD", "id": "CNNVD-201310-514" } ], "trust": 0.9 }, "cve": "CVE-2013-6128", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2013-6128", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2013-13162", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-6128", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2013-6128", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2013-13162", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201310-514", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13162" }, { "db": "JVNDB", "id": "JVNDB-2013-004902" }, { "db": "CNNVD", "id": "CNNVD-201310-514" }, { "db": "NVD", "id": "CVE-2013-6128" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The KCHARTXYLib.KChartXY ActiveX control in KChartXY.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict SaveToFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the single pathname argument, as demonstrated by a directory traversal attack. Kingview is the first SCADA product launched by Asia Control for small and medium-sized projects for monitoring and controlling automation equipment and processes. WellinTech KingView ActiveX has multiple arbitrary file coverage vulnerabilities. Because the program fails to properly filter user input, an attacker can exploit the vulnerability to save arbitrary files on the affected application context computer. WellinTech KingView is prone to multiple insecure-method vulnerabilities because it fails to properly sanitize user-supplied input. \nKingView 6.53 is vulnerable; other versions may also be affected", "sources": [ { "db": "NVD", "id": "CVE-2013-6128" }, { "db": "JVNDB", "id": "JVNDB-2013-004902" }, { "db": "CNVD", "id": "CNVD-2013-13162" }, { "db": "BID", "id": "62419" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-6128", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-13-295-01", "trust": 2.4 }, { "db": "EXPLOIT-DB", "id": "28085", "trust": 1.6 }, { "db": "BID", "id": "62419", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2013-004902", "trust": 0.8 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-13-256-01", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2013-13162", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201310-514", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13162" }, { "db": "BID", "id": "62419" }, { "db": "JVNDB", "id": "JVNDB-2013-004902" }, { "db": "CNNVD", "id": "CNNVD-201310-514" }, { "db": "NVD", "id": "CVE-2013-6128" } ] }, "id": "VAR-201310-0626", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-13162" } ], "trust": 1.1748105999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13162" } ] }, "last_update_date": "2024-11-23T22:08:28.927000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://en.wellintech.com/" }, { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://www.wellintech.co.jp/" }, { "title": "WellinTech KingView ActiveX has multiple patches for arbitrary file coverage vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/67162" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13162" }, { "db": "JVNDB", "id": "JVNDB-2013-004902" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004902" }, { "db": "NVD", "id": "CVE-2013-6128" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://ics-cert.us-cert.gov/advisories/icsa-13-295-01" }, { "trust": 1.6, "url": "http://www.exploit-db.com/exploits/28085/" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6128" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6128" }, { "trust": 0.6, "url": "http://ics-cert.us-cert.gov/alerts/ics-alert-13-256-01" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/62419" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13162" }, { "db": "JVNDB", "id": "JVNDB-2013-004902" }, { "db": "CNNVD", "id": "CNNVD-201310-514" }, { "db": "NVD", "id": "CVE-2013-6128" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2013-13162" }, { "db": "BID", "id": "62419" }, { "db": "JVNDB", "id": "JVNDB-2013-004902" }, { "db": "CNNVD", "id": "CNNVD-201310-514" }, { "db": "NVD", "id": "CVE-2013-6128" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-09-22T00:00:00", "db": "CNVD", "id": "CNVD-2013-13162" }, { "date": "2013-09-04T00:00:00", "db": "BID", "id": "62419" }, { "date": "2013-10-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004902" }, { "date": "2013-09-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-514" }, { "date": "2013-10-25T20:55:03.517000", "db": "NVD", "id": "CVE-2013-6128" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2013-13162" }, { "date": "2013-10-23T00:37:00", "db": "BID", "id": "62419" }, { "date": "2013-10-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004902" }, { "date": "2013-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-514" }, { "date": "2024-11-21T01:58:44.483000", "db": "NVD", "id": "CVE-2013-6128" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-514" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView of KChartXY.ocx Vulnerable to arbitrary file generation", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004902" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-514" } ], "trust": 0.6 } }
var-201207-0379
Vulnerability from variot
Stack-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555. KingView is a product for building data information service platforms for industrial automation. WellinTech KingView is prone to multiple memory corruption vulnerabilities and a directory-traversal vulnerability. Failed exploit attempts will result in a denial-of-service condition. WellinTech KingView 6.53 is vulnerable. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: KingHistorian Memory Corruption Vulnerability
SECUNIA ADVISORY ID: SA49765
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49765/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49765
RELEASE DATE: 2012-07-09
DISCUSS ADVISORY: http://secunia.com/advisories/49765/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/49765/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=49765
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in KingHistorian, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to an invalid pointer write error, which can be exploited to corrupt memory via a specially crafted packet sent to port 5678.
Successful exploitation may allow execution of arbitrary code.
The vulnerability is reported in version 3.0.
SOLUTION: Install patch.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Dillon Beresford.
ORIGINAL ADVISORY: ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201207-0379", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "eq", "trust": 2.3, "vendor": "wellintech", "version": "6.53" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "65.30.17249" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "65.30.2010.18018" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "6.5.30.2010.18018" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "3.0" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "6.52" }, { "model": "kingview", "scope": "lte", "trust": 1.0, "vendor": "wellintech", "version": "6.53" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "3.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "6.5.30.2010.18018" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "6.52" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "65.30.2010.18018" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "65.30.17249" } ], "sources": [ { "db": "IVD", "id": "b1595316-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3529" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003008" }, { "db": "CNNVD", "id": "CNNVD-201207-044" }, { "db": "NVD", "id": "CVE-2012-1830" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wellintech:kingview", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003008" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Carlos Mario Penagos Hollman and Dillon Beresford", "sources": [ { "db": "BID", "id": "54280" } ], "trust": 0.3 }, "cve": "CVE-2012-1830", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2012-1830", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "b1595316-2353-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1830", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2012-1830", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201207-044", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "b1595316-2353-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "b1595316-2353-11e6-abef-000c29c66e3d" }, { "db": "JVNDB", "id": "JVNDB-2012-003008" }, { "db": "CNNVD", "id": "CNNVD-201207-044" }, { "db": "NVD", "id": "CVE-2012-1830" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555. KingView is a product for building data information service platforms for industrial automation. WellinTech KingView is prone to multiple memory corruption vulnerabilities and a directory-traversal vulnerability. Failed exploit attempts will result in a denial-of-service condition. \nWellinTech KingView 6.53 is vulnerable. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nKingHistorian Memory Corruption Vulnerability\n\nSECUNIA ADVISORY ID:\nSA49765\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49765/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49765\n\nRELEASE DATE:\n2012-07-09\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49765/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49765/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49765\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in KingHistorian, which can be\nexploited by malicious people to compromise a vulnerable system. \n\nThe vulnerability is caused due to an invalid pointer write error,\nwhich can be exploited to corrupt memory via a specially crafted\npacket sent to port 5678. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\nThe vulnerability is reported in version 3.0. \n\nSOLUTION:\nInstall patch. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nICS-CERT credits Dillon Beresford. \n\nORIGINAL ADVISORY:\nICS-CERT:\nhttp://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-1830" }, { "db": "JVNDB", "id": "JVNDB-2012-003008" }, { "db": "CNVD", "id": "CNVD-2012-3529" }, { "db": "BID", "id": "54280" }, { "db": "IVD", "id": "b1595316-2353-11e6-abef-000c29c66e3d" }, { "db": "PACKETSTORM", "id": "114551" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1830", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-12-185-01", "trust": 3.1 }, { "db": "CNVD", "id": "CNVD-2012-3529", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201207-044", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-003008", "trust": 0.8 }, { "db": "BID", "id": "54280", "trust": 0.3 }, { "db": "IVD", "id": "B1595316-2353-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "SECUNIA", "id": "49765", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "114551", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "b1595316-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3529" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003008" }, { "db": "PACKETSTORM", "id": "114551" }, { "db": "CNNVD", "id": "CNNVD-201207-044" }, { "db": "NVD", "id": "CVE-2012-1830" } ] }, "id": "VAR-201207-0379", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "b1595316-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3529" } ], "trust": 1.3748106 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "b1595316-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3529" } ] }, "last_update_date": "2024-11-23T21:55:58.617000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Jun.27,2012 -Patch for KingView6.53", "trust": 0.8, "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.wellintech.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.wellintech.co.jp/" }, { "title": "WellinTech KingView Stack Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/18574" }, { "title": "KV20120322-EN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=43659" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-3529" }, { "db": "JVNDB", "id": "JVNDB-2012-003008" }, { "db": "CNNVD", "id": "CNNVD-201207-044" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003008" }, { "db": "NVD", "id": "CVE-2012-1830" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-185-01.pdf" }, { "trust": 1.6, "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1830" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1830" }, { "trust": 0.3, "url": "http://www.kingview.com/" }, { "trust": 0.1, "url": "http://secunia.com/psi_30_beta_launch" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49765/#comments" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49765/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49765" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-3529" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003008" }, { "db": "PACKETSTORM", "id": "114551" }, { "db": "CNNVD", "id": "CNNVD-201207-044" }, { "db": "NVD", "id": "CVE-2012-1830" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "b1595316-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3529" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003008" }, { "db": "PACKETSTORM", "id": "114551" }, { "db": "CNNVD", "id": "CNNVD-201207-044" }, { "db": "NVD", "id": "CVE-2012-1830" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-07-09T00:00:00", "db": "IVD", "id": "b1595316-2353-11e6-abef-000c29c66e3d" }, { "date": "2012-07-09T00:00:00", "db": "CNVD", "id": "CNVD-2012-3529" }, { "date": "2012-07-03T00:00:00", "db": "BID", "id": "54280" }, { "date": "2012-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003008" }, { "date": "2012-07-09T03:48:55", "db": "PACKETSTORM", "id": "114551" }, { "date": "2012-07-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-044" }, { "date": "2012-07-05T03:23:18.230000", "db": "NVD", "id": "CVE-2012-1830" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2012-3529" }, { "date": "2015-03-19T09:08:00", "db": "BID", "id": "54280" }, { "date": "2012-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003008" }, { "date": "2012-07-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-044" }, { "date": "2024-11-21T01:37:51.710000", "db": "NVD", "id": "CVE-2012-1830" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201207-044" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView Stack Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "b1595316-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3529" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "b1595316-2353-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201207-044" } ], "trust": 0.8 } }
var-201112-0059
Vulnerability from variot
Heap-based buffer overflow in nettransdll.dll in HistorySvr.exe (aka HistoryServer.exe) in WellinTech KingView 6.53 and 65.30.2010.18018 allows remote attackers to execute arbitrary code via a crafted op-code 3 packet. Authentication is not required to exploit this vulnerability. The specific flaw exists within the protocol parsing code inside nettransdll.dll. The parent service is called HistoryServer.exe and listens on port 777. When a packet with op-code 3 is received, the service allocates memory from the heap based on the 10th and 11th bytes of the packet (element count). Packet data is then copied into the allocated buffer based on the first two bytes of the packet (packet size). KingView is a product for building data information service platforms for industrial automation. This vulnerability can be triggered by sending a data message of more than a certain length to the TCP 777 port. KingView is prone to a heap-based buffer-overflow vulnerability because it fails to properly validate user-supplied input. Failed exploit attempts will likely result in denial-of-service conditions. KingView 65.30.2010.18018 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
TITLE: KingView HistorySvr Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA47339
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47339/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47339
RELEASE DATE: 2011-12-22
DISCUSS ADVISORY: http://secunia.com/advisories/47339/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/47339/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47339
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in KingView, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to an unspecified error in the nettransdll.dll module of the HistorySvr component.
The vulnerability is reported in version 6.53 (65.30.2010.18018).
SOLUTION: Apply patch.
PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Luigi Auriemma via ZDI.
ORIGINAL ADVISORY: KingView: http://en.wellintech.com/news/detail.aspx?contentid=166
ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
- -- Vendor Response:
WellinTech has issued an update to correct this vulnerability. More details can be found at:
http://www.kingview.com/news/detail.aspx?contentid=587
-
-- Disclosure Timeline: 2011-11-09 - Vulnerability reported to vendor 2011-12-22 - Coordinated public release of advisory
-
-- Credit: This vulnerability was discovered by:
-
Luigi Auriemma
-
-- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities.
Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at:
http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is used. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product.
Our vulnerability disclosure policy is available online at:
http://www.zerodayinitiative.com/advisories/disclosure_policy/
Follow the ZDI on Twitter:
http://twitter.com/thezdi
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.17 (MingW32)
iQEcBAEBAgAGBQJO81sqAAoJEFVtgMGTo1scImgIAKikq6VqLK8P6zI5vIfUX3/I hJ2Ee4eAEB1P3qsehw3G4ZelP6uJUbxrVAl0UoyFctPQL+Jh+XkKmiJskzzTlvtz 3TfL0RZBgSnHHUnusjxdpDO7kmzIlFIMbWJgQLGaRRVTVXLukSgFws7cdAH1lo4V c64jAXagVvv9gJUHGUMemqR+tpHxSa7YRdribO/P192cc31z7wh/ybjIP7dCev9O zpH5sQ1PFgaVb8CMLxMbHiVVzCgbzJ59q/ydoG5TUo2XnDkinthQ3VNoGaeGIKWZ aLMrG+gREbfsdKBvlgzcAgAjIQHVeK8SiIZBICrVcHYFED5BQtmyKhzUJG+md/E= =BHoc -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "kingview", "scope": "eq", "trust": 3.3, "vendor": "wellintech", "version": "65.30.2010.18018" }, { "_id": null, "model": "kingview", "scope": "eq", "trust": 2.4, "vendor": "wellintech", "version": "6.53" }, { "_id": null, "model": "kingview", "scope": null, "trust": 0.7, "vendor": "wellintech", "version": null }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "6.53" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "65.30.2010.18018" } ], "sources": [ { "db": "IVD", "id": "4563be20-2354-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-11-351" }, { "db": "CNVD", "id": "CNVD-2011-5419" }, { "db": "BID", "id": "51159" }, { "db": "JVNDB", "id": "JVNDB-2010-002874" }, { "db": "CNNVD", "id": "CNNVD-201112-404" }, { "db": "NVD", "id": "CVE-2011-4536" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wellintech:kingview", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-002874" } ] }, "credits": { "_id": null, "data": "Luigi Auriemma", "sources": [ { "db": "ZDI", "id": "ZDI-11-351" }, { "db": "BID", "id": "51159" }, { "db": "CNNVD", "id": "CNNVD-201112-404" } ], "trust": 1.6 }, "cve": "CVE-2011-4536", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2011-4536", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 2.5, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "4563be20-2354-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-4536", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2011-4536", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2011-4536", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201112-404", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "4563be20-2354-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "4563be20-2354-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-11-351" }, { "db": "JVNDB", "id": "JVNDB-2010-002874" }, { "db": "CNNVD", "id": "CNNVD-201112-404" }, { "db": "NVD", "id": "CVE-2011-4536" } ] }, "description": { "_id": null, "data": "Heap-based buffer overflow in nettransdll.dll in HistorySvr.exe (aka HistoryServer.exe) in WellinTech KingView 6.53 and 65.30.2010.18018 allows remote attackers to execute arbitrary code via a crafted op-code 3 packet. Authentication is not required to exploit this vulnerability. The specific flaw exists within the protocol parsing code inside nettransdll.dll. The parent service is called HistoryServer.exe and listens on port 777. When a packet with op-code 3 is received, the service allocates memory from the heap based on the 10th and 11th bytes of the packet (element count). Packet data is then copied into the allocated buffer based on the first two bytes of the packet (packet size). KingView is a product for building data information service platforms for industrial automation. This vulnerability can be triggered by sending a data message of more than a certain length to the TCP 777 port. KingView is prone to a heap-based buffer-overflow vulnerability because it fails to properly validate user-supplied input. Failed exploit attempts will likely result in denial-of-service conditions. \nKingView 65.30.2010.18018 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------\n\nSecunia is hiring!\n\nFind your next job here:\n\nhttp://secunia.com/company/jobs/\n\n----------------------------------------------------------------------\n\nTITLE:\nKingView HistorySvr Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA47339\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/47339/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47339\n\nRELEASE DATE:\n2011-12-22\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/47339/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/47339/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47339\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in KingView, which can be exploited\nby malicious people to compromise a vulnerable system. \n\nThe vulnerability is caused due to an unspecified error in the\nnettransdll.dll module of the HistorySvr component. \n\nThe vulnerability is reported in version 6.53 (65.30.2010.18018). \n\nSOLUTION:\nApply patch. \n\nPROVIDED AND/OR DISCOVERED BY:\nICS-CERT credits Luigi Auriemma via ZDI. \n\nORIGINAL ADVISORY:\nKingView:\nhttp://en.wellintech.com/news/detail.aspx?contentid=166\n\nICS-CERT:\nhttp://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\n- -- Vendor Response:\n\nWellinTech has issued an update to correct this vulnerability. More\ndetails can be found at:\n\nhttp://www.kingview.com/news/detail.aspx?contentid=587\n\n\n\n- -- Disclosure Timeline:\n2011-11-09 - Vulnerability reported to vendor\n2011-12-22 - Coordinated public release of advisory\n\n- -- Credit:\nThis vulnerability was discovered by:\n\n* Luigi Auriemma\n\n\n\n- -- About the Zero Day Initiative (ZDI):\nEstablished by TippingPoint, The Zero Day Initiative (ZDI) represents\na best-of-breed model for rewarding security researchers for responsibly\ndisclosing discovered vulnerabilities. \n\nResearchers interested in getting paid for their security research\nthrough the ZDI can find more information and sign-up at:\n\n http://www.zerodayinitiative.com\n\nThe ZDI is unique in how the acquired vulnerability information is\nused. Instead, upon notifying the affected product vendor,\nTippingPoint provides its customers with zero day protection through\nits intrusion prevention technology. Explicit details regarding the\nspecifics of the vulnerability are not exposed to any parties until\nan official vendor patch is publicly available. Furthermore, with the\naltruistic aim of helping to secure a broader user base, TippingPoint\nprovides this vulnerability information confidentially to security\nvendors (including competitors) who have a vulnerability protection or\nmitigation product. \n\nOur vulnerability disclosure policy is available online at:\n\n http://www.zerodayinitiative.com/advisories/disclosure_policy/\n\nFollow the ZDI on Twitter:\n\n http://twitter.com/thezdi\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2.0.17 (MingW32)\n\niQEcBAEBAgAGBQJO81sqAAoJEFVtgMGTo1scImgIAKikq6VqLK8P6zI5vIfUX3/I\nhJ2Ee4eAEB1P3qsehw3G4ZelP6uJUbxrVAl0UoyFctPQL+Jh+XkKmiJskzzTlvtz\n3TfL0RZBgSnHHUnusjxdpDO7kmzIlFIMbWJgQLGaRRVTVXLukSgFws7cdAH1lo4V\nc64jAXagVvv9gJUHGUMemqR+tpHxSa7YRdribO/P192cc31z7wh/ybjIP7dCev9O\nzpH5sQ1PFgaVb8CMLxMbHiVVzCgbzJ59q/ydoG5TUo2XnDkinthQ3VNoGaeGIKWZ\naLMrG+gREbfsdKBvlgzcAgAjIQHVeK8SiIZBICrVcHYFED5BQtmyKhzUJG+md/E=\n=BHoc\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n", "sources": [ { "db": "NVD", "id": "CVE-2011-4536" }, { "db": "JVNDB", "id": "JVNDB-2010-002874" }, { "db": "ZDI", "id": "ZDI-11-351" }, { "db": "CNVD", "id": "CNVD-2011-5419" }, { "db": "BID", "id": "51159" }, { "db": "IVD", "id": "4563be20-2354-11e6-abef-000c29c66e3d" }, { "db": "PACKETSTORM", "id": "108117" }, { "db": "PACKETSTORM", "id": "108092" } ], "trust": 3.42 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2011-4536", "trust": 4.3 }, { "db": "ICS CERT", "id": "ICSA-11-355-02", "trust": 3.4 }, { "db": "ZDI", "id": "ZDI-11-351", "trust": 2.7 }, { "db": "SECUNIA", "id": "47339", "trust": 1.8 }, { "db": "OSVDB", "id": "77992", "trust": 1.6 }, { "db": "BID", "id": "51159", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2011-5419", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201112-404", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2010-002874", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1261", "trust": 0.7 }, { "db": "NSFOCUS", "id": "18383", "trust": 0.6 }, { "db": "IVD", "id": "4563BE20-2354-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "108117", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "108092", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "4563be20-2354-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-11-351" }, { "db": "CNVD", "id": "CNVD-2011-5419" }, { "db": "BID", "id": "51159" }, { "db": "JVNDB", "id": "JVNDB-2010-002874" }, { "db": "PACKETSTORM", "id": "108117" }, { "db": "PACKETSTORM", "id": "108092" }, { "db": "CNNVD", "id": "CNNVD-201112-404" }, { "db": "NVD", "id": "CVE-2011-4536" } ] }, "id": "VAR-201112-0059", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "4563be20-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5419" } ], "trust": 1.3748106 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "4563be20-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5419" } ] }, "last_update_date": "2024-11-23T22:08:53.761000Z", "patch": { "_id": null, "data": [ { "title": "166", "trust": 0.8, "url": "http://en.wellintech.com/news/detail.aspx?contentid=166" }, { "title": "KingView6.52\u30686.53\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.wellintech.co.jp/News.htm#News20110118" }, { "title": "\u30a6\u30a7\u30ea\u30f3\u30c6\u30c3\u30af\u30fb\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e ", "trust": 0.8, "url": "http://www.wellintech.co.jp/" }, { "title": "WellinTech has issued an update to correct this vulnerability.", "trust": 0.7, "url": "http://www.kingview.com/news/detail.aspx?contentid=587" }, { "title": "KingView \u0027HistoryServer.exe\u0027 patch based on heap buffer overflow vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/6441" }, { "title": "nettransdll", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42232" } ], "sources": [ { "db": "ZDI", "id": "ZDI-11-351" }, { "db": "CNVD", "id": "CNVD-2011-5419" }, { "db": "JVNDB", "id": "JVNDB-2010-002874" }, { "db": "CNNVD", "id": "CNNVD-201112-404" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-002874" }, { "db": "NVD", "id": "CVE-2011-4536" } ] }, "references": { "_id": null, "data": [ { "trust": 3.4, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-355-02.pdf" }, { "trust": 2.7, "url": "http://www.kingview.com/news/detail.aspx?contentid=587" }, { "trust": 1.9, "url": "http://www.zerodayinitiative.com/advisories/zdi-11-351/" }, { "trust": 1.7, "url": "http://en.wellintech.com/news/detail.aspx?contentid=166" }, { "trust": 1.6, "url": "http://www.osvdb.org/77992" }, { "trust": 1.6, "url": "http://secunia.com/advisories/47339" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4536" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4536" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/51159" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/18383" }, { "trust": 0.3, "url": "http://www.kingview.com/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47339" }, { "trust": 0.1, "url": "http://secunia.com/company/jobs/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47339/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47339/#comments" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com/advisories/disclosure_policy/" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com/advisories/zdi-11-351" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4536" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://twitter.com/thezdi" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" } ], "sources": [ { "db": "ZDI", "id": "ZDI-11-351" }, { "db": "CNVD", "id": "CNVD-2011-5419" }, { "db": "BID", "id": "51159" }, { "db": "JVNDB", "id": "JVNDB-2010-002874" }, { "db": "PACKETSTORM", "id": "108117" }, { "db": "PACKETSTORM", "id": "108092" }, { "db": "CNNVD", "id": "CNNVD-201112-404" }, { "db": "NVD", "id": "CVE-2011-4536" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "4563be20-2354-11e6-abef-000c29c66e3d", "ident": null }, { "db": "ZDI", "id": "ZDI-11-351", "ident": null }, { "db": "CNVD", "id": "CNVD-2011-5419", "ident": null }, { "db": "BID", "id": "51159", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2010-002874", "ident": null }, { "db": "PACKETSTORM", "id": "108117", "ident": null }, { "db": "PACKETSTORM", "id": "108092", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201112-404", "ident": null }, { "db": "NVD", "id": "CVE-2011-4536", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2011-12-23T00:00:00", "db": "IVD", "id": "4563be20-2354-11e6-abef-000c29c66e3d", "ident": null }, { "date": "2011-12-22T00:00:00", "db": "ZDI", "id": "ZDI-11-351", "ident": null }, { "date": "2011-12-23T00:00:00", "db": "CNVD", "id": "CNVD-2011-5419", "ident": null }, { "date": "2011-12-21T00:00:00", "db": "BID", "id": "51159", "ident": null }, { "date": "2011-12-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-002874", "ident": null }, { "date": "2011-12-22T08:52:41", "db": "PACKETSTORM", "id": "108117", "ident": null }, { "date": "2011-12-22T19:31:56", "db": "PACKETSTORM", "id": "108092", "ident": null }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-404", "ident": null }, { "date": "2011-12-27T04:01:39.857000", "db": "NVD", "id": "CVE-2011-4536", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2011-12-22T00:00:00", "db": "ZDI", "id": "ZDI-11-351", "ident": null }, { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2011-5419", "ident": null }, { "date": "2011-12-22T19:30:00", "db": "BID", "id": "51159", "ident": null }, { "date": "2011-12-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-002874", "ident": null }, { "date": "2012-01-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-404", "ident": null }, { "date": "2024-11-21T01:32:29.910000", "db": "NVD", "id": "CVE-2011-4536", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201112-404" } ], "trust": 0.6 }, "title": { "_id": null, "data": "KingView \u0027HistoryServer.exe\u0027 Heap-based buffer overflow vulnerability", "sources": [ { "db": "IVD", "id": "4563be20-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5419" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "4563be20-2354-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201112-404" } ], "trust": 0.8 } }
var-201207-0380
Vulnerability from variot
Heap-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555. KingView is a product for building data information service platforms for industrial automation. WellinTech KingView is prone to multiple memory corruption vulnerabilities and a directory-traversal vulnerability. Failed exploit attempts will result in a denial-of-service condition. WellinTech KingView 6.53 is vulnerable. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: KingHistorian Memory Corruption Vulnerability
SECUNIA ADVISORY ID: SA49765
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49765/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49765
RELEASE DATE: 2012-07-09
DISCUSS ADVISORY: http://secunia.com/advisories/49765/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/49765/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=49765
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in KingHistorian, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to an invalid pointer write error, which can be exploited to corrupt memory via a specially crafted packet sent to port 5678.
Successful exploitation may allow execution of arbitrary code.
The vulnerability is reported in version 3.0.
SOLUTION: Install patch.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Dillon Beresford.
ORIGINAL ADVISORY: ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201207-0380", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "eq", "trust": 2.3, "vendor": "wellintech", "version": "6.53" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "65.30.17249" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "65.30.2010.18018" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "6.5.30.2010.18018" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "3.0" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "6.52" }, { "model": "kingview", "scope": "lte", "trust": 1.0, "vendor": "wellintech", "version": "6.53" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "3.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "6.5.30.2010.18018" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "6.52" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "65.30.2010.18018" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "65.30.17249" } ], "sources": [ { "db": "IVD", "id": "b1534016-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3531" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003009" }, { "db": "CNNVD", "id": "CNNVD-201207-045" }, { "db": "NVD", "id": "CVE-2012-1831" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wellintech:kingview", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003009" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Carlos Mario Penagos Hollman and Dillon Beresford", "sources": [ { "db": "BID", "id": "54280" } ], "trust": 0.3 }, "cve": "CVE-2012-1831", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2012-1831", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "b1534016-2353-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1831", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2012-1831", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201207-045", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "b1534016-2353-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "b1534016-2353-11e6-abef-000c29c66e3d" }, { "db": "JVNDB", "id": "JVNDB-2012-003009" }, { "db": "CNNVD", "id": "CNNVD-201207-045" }, { "db": "NVD", "id": "CVE-2012-1831" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Heap-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555. KingView is a product for building data information service platforms for industrial automation. WellinTech KingView is prone to multiple memory corruption vulnerabilities and a directory-traversal vulnerability. Failed exploit attempts will result in a denial-of-service condition. \nWellinTech KingView 6.53 is vulnerable. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nKingHistorian Memory Corruption Vulnerability\n\nSECUNIA ADVISORY ID:\nSA49765\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49765/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49765\n\nRELEASE DATE:\n2012-07-09\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49765/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49765/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49765\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in KingHistorian, which can be\nexploited by malicious people to compromise a vulnerable system. \n\nThe vulnerability is caused due to an invalid pointer write error,\nwhich can be exploited to corrupt memory via a specially crafted\npacket sent to port 5678. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\nThe vulnerability is reported in version 3.0. \n\nSOLUTION:\nInstall patch. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nICS-CERT credits Dillon Beresford. \n\nORIGINAL ADVISORY:\nICS-CERT:\nhttp://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-1831" }, { "db": "JVNDB", "id": "JVNDB-2012-003009" }, { "db": "CNVD", "id": "CNVD-2012-3531" }, { "db": "BID", "id": "54280" }, { "db": "IVD", "id": "b1534016-2353-11e6-abef-000c29c66e3d" }, { "db": "PACKETSTORM", "id": "114551" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1831", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-12-185-01", "trust": 3.1 }, { "db": "CNVD", "id": "CNVD-2012-3531", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201207-045", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-003009", "trust": 0.8 }, { "db": "BID", "id": "54280", "trust": 0.3 }, { "db": "IVD", "id": "B1534016-2353-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "SECUNIA", "id": "49765", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "114551", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "b1534016-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3531" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003009" }, { "db": "PACKETSTORM", "id": "114551" }, { "db": "CNNVD", "id": "CNNVD-201207-045" }, { "db": "NVD", "id": "CVE-2012-1831" } ] }, "id": "VAR-201207-0380", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "b1534016-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3531" } ], "trust": 1.3748106 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "b1534016-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3531" } ] }, "last_update_date": "2024-11-23T21:55:58.660000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Jun.27,2012 -Patch for KingView6.53", "trust": 0.8, "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.wellintech.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.wellintech.co.jp/" }, { "title": "Patch for WellinTech KingView heap buffer overflow vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/18573" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-3531" }, { "db": "JVNDB", "id": "JVNDB-2012-003009" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-003009" }, { "db": "NVD", "id": "CVE-2012-1831" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-185-01.pdf" }, { "trust": 1.6, "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1831" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1831" }, { "trust": 0.3, "url": "http://www.kingview.com/" }, { "trust": 0.1, "url": "http://secunia.com/psi_30_beta_launch" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49765/#comments" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49765/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49765" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-3531" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003009" }, { "db": "PACKETSTORM", "id": "114551" }, { "db": "CNNVD", "id": "CNNVD-201207-045" }, { "db": "NVD", "id": "CVE-2012-1831" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "b1534016-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3531" }, { "db": "BID", "id": "54280" }, { "db": "JVNDB", "id": "JVNDB-2012-003009" }, { "db": "PACKETSTORM", "id": "114551" }, { "db": "CNNVD", "id": "CNNVD-201207-045" }, { "db": "NVD", "id": "CVE-2012-1831" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-07-09T00:00:00", "db": "IVD", "id": "b1534016-2353-11e6-abef-000c29c66e3d" }, { "date": "2012-07-09T00:00:00", "db": "CNVD", "id": "CNVD-2012-3531" }, { "date": "2012-07-03T00:00:00", "db": "BID", "id": "54280" }, { "date": "2012-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003009" }, { "date": "2012-07-09T03:48:55", "db": "PACKETSTORM", "id": "114551" }, { "date": "2012-07-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-045" }, { "date": "2012-07-05T03:23:18.277000", "db": "NVD", "id": "CVE-2012-1831" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2012-3531" }, { "date": "2015-03-19T09:08:00", "db": "BID", "id": "54280" }, { "date": "2012-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-003009" }, { "date": "2012-07-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-045" }, { "date": "2024-11-21T01:37:51.820000", "db": "NVD", "id": "CVE-2012-1831" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201207-045" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView Heap Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "b1534016-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-3531" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "b1534016-2353-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201207-045" } ], "trust": 0.8 } }
var-201310-0404
Vulnerability from variot
The SUPERGRIDLib.SuperGrid ActiveX control in SuperGrid.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict ReplaceDBFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the two pathname arguments, as demonstrated by a directory traversal attack. Kingview is the first SCADA product launched by Asia Control for small and medium-sized projects for monitoring and controlling automation equipment and processes. WellinTech KingView ActiveX has multiple arbitrary file coverage vulnerabilities. Because the program fails to properly filter user input, an attacker can exploit the vulnerability to save arbitrary files on the affected application context computer. WellinTech KingView is prone to multiple insecure-method vulnerabilities because it fails to properly sanitize user-supplied input. KingView 6.53 is vulnerable; other versions may also be affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0404", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "3.0" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "6.52" }, { "model": "kingview", "scope": "eq", "trust": 1.5, "vendor": "wellintech", "version": "6.53" }, { "model": "kingview", "scope": "lte", "trust": 1.0, "vendor": "wellintech", "version": "6.53" }, { "model": "kingview", "scope": "lt", "trust": 0.8, "vendor": "wellintech", "version": "6.53 (supergrid.ocx 65.30.30000.10002 )" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "kingview", "version": "3.0" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "kingview", "version": "6.52" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "kingview", "version": "*" } ], "sources": [ { "db": "IVD", "id": "89f639b6-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "89fad822-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ce5c0e88-1f0a-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13162" }, { "db": "BID", "id": "62419" }, { "db": "JVNDB", "id": "JVNDB-2013-004901" }, { "db": "CNNVD", "id": "CNNVD-201309-273" }, { "db": "NVD", "id": "CVE-2013-6127" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wellintech:kingview", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004901" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Blake", "sources": [ { "db": "BID", "id": "62419" }, { "db": "CNNVD", "id": "CNNVD-201309-273" } ], "trust": 0.9 }, "cve": "CVE-2013-6127", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2013-6127", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2013-13162", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "89f639b6-2352-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "89fad822-2352-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "ce5c0e88-1f0a-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-6127", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2013-6127", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2013-13162", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201309-273", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "89f639b6-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "89fad822-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "ce5c0e88-1f0a-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "89f639b6-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "89fad822-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ce5c0e88-1f0a-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13162" }, { "db": "JVNDB", "id": "JVNDB-2013-004901" }, { "db": "CNNVD", "id": "CNNVD-201309-273" }, { "db": "NVD", "id": "CVE-2013-6127" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SUPERGRIDLib.SuperGrid ActiveX control in SuperGrid.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict ReplaceDBFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the two pathname arguments, as demonstrated by a directory traversal attack. Kingview is the first SCADA product launched by Asia Control for small and medium-sized projects for monitoring and controlling automation equipment and processes. WellinTech KingView ActiveX has multiple arbitrary file coverage vulnerabilities. Because the program fails to properly filter user input, an attacker can exploit the vulnerability to save arbitrary files on the affected application context computer. WellinTech KingView is prone to multiple insecure-method vulnerabilities because it fails to properly sanitize user-supplied input. \nKingView 6.53 is vulnerable; other versions may also be affected", "sources": [ { "db": "NVD", "id": "CVE-2013-6127" }, { "db": "JVNDB", "id": "JVNDB-2013-004901" }, { "db": "CNVD", "id": "CNVD-2013-13162" }, { "db": "BID", "id": "62419" }, { "db": "IVD", "id": "89f639b6-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "89fad822-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ce5c0e88-1f0a-11e6-abef-000c29c66e3d" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-6127", "trust": 3.9 }, { "db": "ICS CERT", "id": "ICSA-13-295-01", "trust": 2.4 }, { "db": "EXPLOIT-DB", "id": "28084", "trust": 1.6 }, { "db": "BID", "id": "62419", "trust": 1.5 }, { "db": "CNVD", "id": "CNVD-2013-13162", "trust": 1.2 }, { "db": "CNNVD", "id": "CNNVD-201309-273", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2013-004901", "trust": 0.8 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-13-256-01", "trust": 0.6 }, { "db": "IVD", "id": "89F639B6-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "89FAD822-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "CE5C0E88-1F0A-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "89f639b6-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "89fad822-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ce5c0e88-1f0a-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13162" }, { "db": "BID", "id": "62419" }, { "db": "JVNDB", "id": "JVNDB-2013-004901" }, { "db": "CNNVD", "id": "CNNVD-201309-273" }, { "db": "NVD", "id": "CVE-2013-6127" } ] }, "id": "VAR-201310-0404", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "89f639b6-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "89fad822-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ce5c0e88-1f0a-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13162" } ], "trust": 1.7748106 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.2 } ], "sources": [ { "db": "IVD", "id": "89f639b6-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "89fad822-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ce5c0e88-1f0a-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13162" } ] }, "last_update_date": "2024-11-23T22:08:28.960000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://en.wellintech.com/" }, { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://www.wellintech.co.jp/" }, { "title": "WellinTech KingView ActiveX has multiple patches for arbitrary file coverage vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/67162" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13162" }, { "db": "JVNDB", "id": "JVNDB-2013-004901" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004901" }, { "db": "NVD", "id": "CVE-2013-6127" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://ics-cert.us-cert.gov/advisories/icsa-13-295-01" }, { "trust": 1.6, "url": "http://www.exploit-db.com/exploits/28084/" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6127" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6127" }, { "trust": 0.6, "url": "http://ics-cert.us-cert.gov/alerts/ics-alert-13-256-01" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/62419" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13162" }, { "db": "JVNDB", "id": "JVNDB-2013-004901" }, { "db": "CNNVD", "id": "CNNVD-201309-273" }, { "db": "NVD", "id": "CVE-2013-6127" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "89f639b6-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "89fad822-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ce5c0e88-1f0a-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13162" }, { "db": "BID", "id": "62419" }, { "db": "JVNDB", "id": "JVNDB-2013-004901" }, { "db": "CNNVD", "id": "CNNVD-201309-273" }, { "db": "NVD", "id": "CVE-2013-6127" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-09-22T00:00:00", "db": "IVD", "id": "89f639b6-2352-11e6-abef-000c29c66e3d" }, { "date": "2013-09-22T00:00:00", "db": "IVD", "id": "89fad822-2352-11e6-abef-000c29c66e3d" }, { "date": "2013-09-22T00:00:00", "db": "IVD", "id": "ce5c0e88-1f0a-11e6-abef-000c29c66e3d" }, { "date": "2013-09-22T00:00:00", "db": "CNVD", "id": "CNVD-2013-13162" }, { "date": "2013-09-04T00:00:00", "db": "BID", "id": "62419" }, { "date": "2013-10-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004901" }, { "date": "2013-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201309-273" }, { "date": "2013-10-25T20:55:03.500000", "db": "NVD", "id": "CVE-2013-6127" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2013-13162" }, { "date": "2013-10-23T00:37:00", "db": "BID", "id": "62419" }, { "date": "2013-10-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004901" }, { "date": "2013-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201309-273" }, { "date": "2024-11-21T01:58:44.383000", "db": "NVD", "id": "CVE-2013-6127" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201309-273" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView ActiveX Multiple arbitrary file coverage vulnerabilities", "sources": [ { "db": "IVD", "id": "89f639b6-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "89fad822-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ce5c0e88-1f0a-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201309-273" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Path traversal", "sources": [ { "db": "IVD", "id": "89f639b6-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "89fad822-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "ce5c0e88-1f0a-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201309-273" } ], "trust": 1.2 } }
var-201802-1244
Vulnerability from variot
KingView 7.5SP1 has an integer overflow during stgopenstorage API read operations. KingView Contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. KingView is the first domestic company to launch industrial configuration software products.
Asian Control Technology KingView has an integer overflow vulnerability. This vulnerability is due to stgopenstorage read failure, and the returned error code is beyond the scope of int on 32-bit systems. An attacker could use this vulnerability to execute arbitrary code
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201802-1244", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "bj tct", "version": "7.5" }, { "model": "kingview", "scope": "eq", "trust": 0.8, "vendor": "wellintech", "version": "7.5sp1" }, { "model": "kingview 7.5sp1", "scope": null, "trust": 0.6, "vendor": "yakong", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "7.5" } ], "sources": [ { "db": "IVD", "id": "e2e6d401-39ab-11e9-8f1d-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-00995" }, { "db": "JVNDB", "id": "JVNDB-2018-002331" }, { "db": "CNNVD", "id": "CNNVD-201802-621" }, { "db": "NVD", "id": "CVE-2018-7471" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wellintech:kingview", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002331" } ] }, "cve": "CVE-2018-7471", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2018-7471", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2018-00995", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "e2e6d401-39ab-11e9-8f1d-000c29342cb1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-7471", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-7471", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-7471", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2018-00995", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201802-621", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "e2e6d401-39ab-11e9-8f1d-000c29342cb1", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "e2e6d401-39ab-11e9-8f1d-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-00995" }, { "db": "JVNDB", "id": "JVNDB-2018-002331" }, { "db": "CNNVD", "id": "CNNVD-201802-621" }, { "db": "NVD", "id": "CVE-2018-7471" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "KingView 7.5SP1 has an integer overflow during stgopenstorage API read operations. KingView Contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. KingView is the first domestic company to launch industrial configuration software products. \n\nAsian Control Technology KingView has an integer overflow vulnerability. This vulnerability is due to stgopenstorage read failure, and the returned error code is beyond the scope of int on 32-bit systems. An attacker could use this vulnerability to execute arbitrary code", "sources": [ { "db": "NVD", "id": "CVE-2018-7471" }, { "db": "JVNDB", "id": "JVNDB-2018-002331" }, { "db": "CNVD", "id": "CNVD-2018-00995" }, { "db": "IVD", "id": "e2e6d401-39ab-11e9-8f1d-000c29342cb1" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-7471", "trust": 3.2 }, { "db": "CNVD", "id": "CNVD-2018-00995", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201802-621", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-002331", "trust": 0.8 }, { "db": "IVD", "id": "E2E6D401-39AB-11E9-8F1D-000C29342CB1", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "e2e6d401-39ab-11e9-8f1d-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-00995" }, { "db": "JVNDB", "id": "JVNDB-2018-002331" }, { "db": "CNNVD", "id": "CNNVD-201802-621" }, { "db": "NVD", "id": "CVE-2018-7471" } ] }, "id": "VAR-201802-1244", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e2e6d401-39ab-11e9-8f1d-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-00995" } ], "trust": 1.5874053 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2e6d401-39ab-11e9-8f1d-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-00995" } ] }, "last_update_date": "2024-11-23T21:53:21.840000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "KingView (1000656)", "trust": 0.8, "url": "http://www.kingview.com/news_info.php?num=1000656" }, { "title": "Asian Controlling King has an integer overflow vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/112771" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-00995" }, { "db": "JVNDB", "id": "JVNDB-2018-002331" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002331" }, { "db": "NVD", "id": "CVE-2018-7471" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.cnvd.org.cn/flaw/show/1202823" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7471" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7471" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002331" }, { "db": "CNNVD", "id": "CNNVD-201802-621" }, { "db": "NVD", "id": "CVE-2018-7471" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e2e6d401-39ab-11e9-8f1d-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-00995" }, { "db": "JVNDB", "id": "JVNDB-2018-002331" }, { "db": "CNNVD", "id": "CNNVD-201802-621" }, { "db": "NVD", "id": "CVE-2018-7471" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-15T00:00:00", "db": "IVD", "id": "e2e6d401-39ab-11e9-8f1d-000c29342cb1" }, { "date": "2018-02-17T00:00:00", "db": "CNVD", "id": "CNVD-2018-00995" }, { "date": "2018-04-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002331" }, { "date": "2018-02-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201802-621" }, { "date": "2018-02-25T07:29:00.337000", "db": "NVD", "id": "CVE-2018-7471" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-21T00:00:00", "db": "CNVD", "id": "CNVD-2018-00995" }, { "date": "2018-04-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002331" }, { "date": "2018-02-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201802-621" }, { "date": "2024-11-21T04:12:11.593000", "db": "NVD", "id": "CVE-2018-7471" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201802-621" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "KingView Integer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002331" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201802-621" } ], "trust": 0.6 } }
var-201205-0303
Vulnerability from variot
Untrusted search path vulnerability in WellinTech KingView 6.53 allows local users to gain privileges via a Trojan horse DLL in the current working directory. WellinTech KingView However, there is a vulnerability that can be obtained because the processing related to the search path is inadequate. Supplementary information : CWE Vulnerability type by CWE-426: Untrusted Search Path ( Unreliable search path ) Has been identified. DLL It may be possible to get permission through the file. KingView is a product for building data information service platforms for industrial automation. WellinTech KingView loads DLL files in an unsafe manner, and an attacker builds malicious files on a remote WebDAV or SMB share, enticing the user to parse, and can load malicious libraries in the application context. WellinTech KingView is prone to a vulnerability which allows attackers to execute arbitrary code. KingView 6.53 is vulnerable; other versions may also be affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201205-0303", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "eq", "trust": 2.5, "vendor": "wellintech", "version": "6.53" }, { "model": "kingview", "scope": "eq", "trust": 0.8, "vendor": "wellintech", "version": "65.30.17249 before" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "6.53" } ], "sources": [ { "db": "IVD", "id": "e7a66bac-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-2253" }, { "db": "BID", "id": "53316" }, { "db": "JVNDB", "id": "JVNDB-2011-005042" }, { "db": "CNNVD", "id": "CNNVD-201205-012" }, { "db": "NVD", "id": "CVE-2012-1819" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wellintech:kingview", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-005042" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Carlos Mario Penagos Hollmann", "sources": [ { "db": "BID", "id": "53316" }, { "db": "CNNVD", "id": "CNNVD-201205-012" } ], "trust": 0.9 }, "cve": "CVE-2012-1819", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2012-1819", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "e7a66bac-2353-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1819", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2012-1819", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201205-012", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "e7a66bac-2353-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "e7a66bac-2353-11e6-abef-000c29c66e3d" }, { "db": "JVNDB", "id": "JVNDB-2011-005042" }, { "db": "CNNVD", "id": "CNNVD-201205-012" }, { "db": "NVD", "id": "CVE-2012-1819" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Untrusted search path vulnerability in WellinTech KingView 6.53 allows local users to gain privileges via a Trojan horse DLL in the current working directory. WellinTech KingView However, there is a vulnerability that can be obtained because the processing related to the search path is inadequate. Supplementary information : CWE Vulnerability type by CWE-426: Untrusted Search Path ( Unreliable search path ) Has been identified. DLL It may be possible to get permission through the file. KingView is a product for building data information service platforms for industrial automation. WellinTech KingView loads DLL files in an unsafe manner, and an attacker builds malicious files on a remote WebDAV or SMB share, enticing the user to parse, and can load malicious libraries in the application context. WellinTech KingView is prone to a vulnerability which allows attackers to execute arbitrary code. \nKingView 6.53 is vulnerable; other versions may also be affected", "sources": [ { "db": "NVD", "id": "CVE-2012-1819" }, { "db": "JVNDB", "id": "JVNDB-2011-005042" }, { "db": "CNVD", "id": "CNVD-2012-2253" }, { "db": "BID", "id": "53316" }, { "db": "IVD", "id": "e7a66bac-2353-11e6-abef-000c29c66e3d" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1819", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-12-122-01", "trust": 3.3 }, { "db": "BID", "id": "53316", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2012-2253", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201205-012", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2011-005042", "trust": 0.8 }, { "db": "IVD", "id": "E7A66BAC-2353-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "e7a66bac-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-2253" }, { "db": "BID", "id": "53316" }, { "db": "JVNDB", "id": "JVNDB-2011-005042" }, { "db": "CNNVD", "id": "CNNVD-201205-012" }, { "db": "NVD", "id": "CVE-2012-1819" } ] }, "id": "VAR-201205-0303", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e7a66bac-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-2253" } ], "trust": 1.3748106 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e7a66bac-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-2253" } ] }, "last_update_date": "2024-11-23T22:42:48.018000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Product News - Patch for KingView 6.53", "trust": 0.8, "url": "http://en.wellintech.com/news/detail.aspx?contentid=168" }, { "title": "Top Page", "trust": 0.8, "url": "http://en.wellintech.com/index.aspx" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.wellintech.co.jp/" }, { "title": "WellinTech KingView DLL loads patches for arbitrary code execution vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/16593" }, { "title": "KV20120322-EN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=43042" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-2253" }, { "db": "JVNDB", "id": "JVNDB-2011-005042" }, { "db": "CNNVD", "id": "CNNVD-201205-012" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-005042" }, { "db": "NVD", "id": "CVE-2012-1819" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-122-01.pdf" }, { "trust": 1.6, "url": "http://en.wellintech.com/news/detail.aspx?contentid=168" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75309" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/53316" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1819" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1819" }, { "trust": 0.3, "url": "http://blog.rapid7.com/?p=5325" }, { "trust": 0.3, "url": "http://blog.metasploit.com/2010/08/exploiting-dll-hijacking-flaws.html" }, { "trust": 0.3, "url": "http://en.wellintech.com/products/detail.aspx?contentid=15" }, { "trust": 0.3, "url": "http://blogs.technet.com/b/srd/archive/2010/08/23/more-information-about-dll-preloading-remote-attack-vector.aspx" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-2253" }, { "db": "BID", "id": "53316" }, { "db": "JVNDB", "id": "JVNDB-2011-005042" }, { "db": "CNNVD", "id": "CNNVD-201205-012" }, { "db": "NVD", "id": "CVE-2012-1819" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e7a66bac-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-2253" }, { "db": "BID", "id": "53316" }, { "db": "JVNDB", "id": "JVNDB-2011-005042" }, { "db": "CNNVD", "id": "CNNVD-201205-012" }, { "db": "NVD", "id": "CVE-2012-1819" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-05-03T00:00:00", "db": "IVD", "id": "e7a66bac-2353-11e6-abef-000c29c66e3d" }, { "date": "2012-05-03T00:00:00", "db": "CNVD", "id": "CNVD-2012-2253" }, { "date": "2012-05-01T00:00:00", "db": "BID", "id": "53316" }, { "date": "2012-05-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-005042" }, { "date": "2012-05-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-012" }, { "date": "2012-05-02T22:55:02.140000", "db": "NVD", "id": "CVE-2012-1819" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2012-2253" }, { "date": "2012-05-01T00:00:00", "db": "BID", "id": "53316" }, { "date": "2012-05-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-005042" }, { "date": "2012-05-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-012" }, { "date": "2024-11-21T01:37:50.547000", "db": "NVD", "id": "CVE-2012-1819" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201205-012" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView Vulnerability gained in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-005042" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "IVD", "id": "e7a66bac-2353-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201205-012" } ], "trust": 0.8 } }
var-201101-0115
Vulnerability from variot
Heap-based buffer overflow in HistorySvr.exe in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a long request to TCP port 777. WellinTech KingView 6.53 Contains a heap overflow vulnerability. WellinTech KingView 6.53 of HistorySrv service (777/tcp) Crafted Flink and Blink When processing pointers A heap overflow vulnerability exists. Attack code using this vulnerability has been released.WellinTech KingView Service disruption by a third party with access to (DoS) An attacker may be attacked or execute arbitrary code with user privileges. KingView is the configuration software in the HMI / SCADA series products produced by Beijing Yakong. This software is mainly used for process control and management monitoring of industrial automation. The software is deployed on the Windows operating system platform, and the 777 service port is opened for historical data synchronization. Because its 777 service port listening process, HistorySvr.exe, does not have adequate security controls in the process of processing data, an attacker can cause the service to crash or achieve overflow by sending a specially constructed data packet to the service port to gain operating system host management permissions. If you further guess the KingView 6.53 management system username and password installed on the host, you will directly gain control of the industrial system associated with it. KingView is prone to a heap-based buffer-overflow vulnerability because it fails to properly validate user-supplied input. Failed exploit attempts will likely result in denial-of-service conditions. KingView 6.53 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------
Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM).
Request a free trial: http://secunia.com/products/corporate/vim/
TITLE: KingView HistorySvr Service Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA42851
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/42851/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=42851
RELEASE DATE: 2011-01-11
DISCUSS ADVISORY: http://secunia.com/advisories/42851/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/42851/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=42851
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been discovered in KingView, which can be exploited by malicious people to compromise a vulnerable system.
Successful exploitation may allow execution of arbitrary code.
The vulnerability is confirmed in version 6.53.
SOLUTION: Restrict access to trusted hosts only (e.g. via network access control lists).
PROVIDED AND/OR DISCOVERED BY: Dillon Beresford
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201101-0115", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "eq", "trust": 3.3, "vendor": "wellintech", "version": "6.53" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "wellintech", "version": null }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "kingview", "version": "6.53" } ], "sources": [ { "db": "IVD", "id": "7d760001-463f-11e9-be76-000c29342cb1" }, { "db": "IVD", "id": "76fcfd92-2355-11e6-abef-000c29c66e3d" }, { "db": "CERT/CC", "id": "VU#180119" }, { "db": "CNVD", "id": "CNVD-2011-0160" }, { "db": "BID", "id": "45727" }, { "db": "JVNDB", "id": "JVNDB-2011-001026" }, { "db": "CNNVD", "id": "CNNVD-201101-108" }, { "db": "NVD", "id": "CVE-2011-0406" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wellintech:kingview", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001026" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dillon Beresford", "sources": [ { "db": "BID", "id": "45727" }, { "db": "CNNVD", "id": "CNNVD-201101-108" } ], "trust": 0.9 }, "cve": "CVE-2011-0406", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2011-0406", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "7d760001-463f-11e9-be76-000c29342cb1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "76fcfd92-2355-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-0406", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#180119", "trust": 0.8, "value": "91.20" }, { "author": "NVD", "id": "CVE-2011-0406", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201101-108", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "7d760001-463f-11e9-be76-000c29342cb1", "trust": 0.2, "value": "CRITICAL" }, { "author": "IVD", "id": "76fcfd92-2355-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2011-0406", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "7d760001-463f-11e9-be76-000c29342cb1" }, { "db": "IVD", "id": "76fcfd92-2355-11e6-abef-000c29c66e3d" }, { "db": "CERT/CC", "id": "VU#180119" }, { "db": "VULMON", "id": "CVE-2011-0406" }, { "db": "JVNDB", "id": "JVNDB-2011-001026" }, { "db": "CNNVD", "id": "CNNVD-201101-108" }, { "db": "NVD", "id": "CVE-2011-0406" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Heap-based buffer overflow in HistorySvr.exe in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a long request to TCP port 777. WellinTech KingView 6.53 Contains a heap overflow vulnerability. WellinTech KingView 6.53 of HistorySrv service (777/tcp) Crafted Flink and Blink When processing pointers A heap overflow vulnerability exists. Attack code using this vulnerability has been released.WellinTech KingView Service disruption by a third party with access to (DoS) An attacker may be attacked or execute arbitrary code with user privileges. KingView is the configuration software in the HMI / SCADA series products produced by Beijing Yakong. This software is mainly used for process control and management monitoring of industrial automation. The software is deployed on the Windows operating system platform, and the 777 service port is opened for historical data synchronization. Because its 777 service port listening process, HistorySvr.exe, does not have adequate security controls in the process of processing data, an attacker can cause the service to crash or achieve overflow by sending a specially constructed data packet to the service port to gain operating system host management permissions. If you further guess the KingView 6.53 management system username and password installed on the host, you will directly gain control of the industrial system associated with it. KingView is prone to a heap-based buffer-overflow vulnerability because it fails to properly validate user-supplied input. Failed exploit attempts will likely result in denial-of-service conditions. \nKingView 6.53 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------\n\n\nSecure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). \n\nRequest a free trial: \nhttp://secunia.com/products/corporate/vim/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nKingView HistorySvr Service Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA42851\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/42851/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42851\n\nRELEASE DATE:\n2011-01-11\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/42851/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/42851/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42851\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been discovered in KingView, which can be\nexploited by malicious people to compromise a vulnerable system. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\nThe vulnerability is confirmed in version 6.53. \n\nSOLUTION:\nRestrict access to trusted hosts only (e.g. via network access\ncontrol lists). \n\nPROVIDED AND/OR DISCOVERED BY:\nDillon Beresford\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2011-0406" }, { "db": "CERT/CC", "id": "VU#180119" }, { "db": "JVNDB", "id": "JVNDB-2011-001026" }, { "db": "CNVD", "id": "CNVD-2011-0160" }, { "db": "BID", "id": "45727" }, { "db": "IVD", "id": "7d760001-463f-11e9-be76-000c29342cb1" }, { "db": "IVD", "id": "76fcfd92-2355-11e6-abef-000c29c66e3d" }, { "db": "VULMON", "id": "CVE-2011-0406" }, { "db": "PACKETSTORM", "id": "97369" } ], "trust": 3.69 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=15957", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2011-0406" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-0406", "trust": 3.8 }, { "db": "SECUNIA", "id": "42851", "trust": 3.4 }, { "db": "CERT/CC", "id": "VU#180119", "trust": 3.0 }, { "db": "BID", "id": "45727", "trust": 2.8 }, { "db": "VUPEN", "id": "ADV-2011-0063", "trust": 2.5 }, { "db": "OSVDB", "id": "70366", "trust": 1.9 }, { "db": "EXPLOIT-DB", "id": "15957", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-11-017-01", "trust": 1.6 }, { "db": "XF", "id": "64559", "trust": 1.4 }, { "db": "SREASON", "id": "8134", "trust": 1.1 }, { "db": "CNVD", "id": "CNVD-2011-0160", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201101-108", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2011-001026", "trust": 0.8 }, { "db": "IVD", "id": "7D760001-463F-11E9-BE76-000C29342CB1", "trust": 0.2 }, { "db": "IVD", "id": "76FCFD92-2355-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2011-0406", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "97369", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d760001-463f-11e9-be76-000c29342cb1" }, { "db": "IVD", "id": "76fcfd92-2355-11e6-abef-000c29c66e3d" }, { "db": "CERT/CC", "id": "VU#180119" }, { "db": "CNVD", "id": "CNVD-2011-0160" }, { "db": "VULMON", "id": "CVE-2011-0406" }, { "db": "BID", "id": "45727" }, { "db": "JVNDB", "id": "JVNDB-2011-001026" }, { "db": "PACKETSTORM", "id": "97369" }, { "db": "CNNVD", "id": "CNNVD-201101-108" }, { "db": "NVD", "id": "CVE-2011-0406" } ] }, "id": "VAR-201101-0115", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7d760001-463f-11e9-be76-000c29342cb1" }, { "db": "IVD", "id": "76fcfd92-2355-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-0160" } ], "trust": 1.5748106 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "7d760001-463f-11e9-be76-000c29342cb1" }, { "db": "IVD", "id": "76fcfd92-2355-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-0160" } ] }, "last_update_date": "2024-11-23T22:31:41.035000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "KingView6.52\u30686.53\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.wellintech.co.jp/News.htm#News20110118" }, { "title": "Asian control company KingView has a buffer overflow vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/2580" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0160" }, { "db": "JVNDB", "id": "JVNDB-2011-001026" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001026" }, { "db": "NVD", "id": "CVE-2011-0406" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "http://secunia.com/advisories/42851" }, { "trust": 2.8, "url": "http://www.kingview.com/news/detail.aspx?contentid=528" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/45727" }, { "trust": 2.5, "url": "http://www.vupen.com/english/advisories/2011/0063" }, { "trust": 2.3, "url": "http://www.kb.cert.org/vuls/id/180119" }, { "trust": 2.2, "url": "http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html" }, { "trust": 1.9, "url": "http://www.cnnvd.org.cn/showcnnvd.html?id=2011010108" }, { "trust": 1.9, "url": "http://osvdb.org/70366" }, { "trust": 1.7, "url": "http://www.exploit-db.com/exploits/15957" }, { "trust": 1.6, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-017-01.pdf" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/64559" }, { "trust": 1.1, "url": "http://securityreason.com/securityalert/8134" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64559" }, { "trust": 0.8, "url": "http://thesauceofutterpwnage.blogspot.com/2011/01/wellintech-issues-security-patch-to.html" }, { "trust": 0.8, "url": "http://www.cert.org.cn/articles/bulletin/common/2011011325250.shtml" }, { "trust": 0.8, "url": "http://threatpost.com/en_us/blogs/china-cert-we-missed-report-scada-hole-011311" }, { "trust": 0.8, "url": "http://en.wellintech.com/products/detail.aspx?contentid=25" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0406" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu180119" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0406" }, { "trust": 0.3, "url": "http://www.kingview.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/15957/" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42851/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/vim/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42851/#comments" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42851" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#180119" }, { "db": "CNVD", "id": "CNVD-2011-0160" }, { "db": "VULMON", "id": "CVE-2011-0406" }, { "db": "BID", "id": "45727" }, { "db": "JVNDB", "id": "JVNDB-2011-001026" }, { "db": "PACKETSTORM", "id": "97369" }, { "db": "CNNVD", "id": "CNNVD-201101-108" }, { "db": "NVD", "id": "CVE-2011-0406" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7d760001-463f-11e9-be76-000c29342cb1" }, { "db": "IVD", "id": "76fcfd92-2355-11e6-abef-000c29c66e3d" }, { "db": "CERT/CC", "id": "VU#180119" }, { "db": "CNVD", "id": "CNVD-2011-0160" }, { "db": "VULMON", "id": "CVE-2011-0406" }, { "db": "BID", "id": "45727" }, { "db": "JVNDB", "id": "JVNDB-2011-001026" }, { "db": "PACKETSTORM", "id": "97369" }, { "db": "CNNVD", "id": "CNNVD-201101-108" }, { "db": "NVD", "id": "CVE-2011-0406" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-01-13T00:00:00", "db": "IVD", "id": "7d760001-463f-11e9-be76-000c29342cb1" }, { "date": "2011-01-13T00:00:00", "db": "IVD", "id": "76fcfd92-2355-11e6-abef-000c29c66e3d" }, { "date": "2011-01-12T00:00:00", "db": "CERT/CC", "id": "VU#180119" }, { "date": "2011-01-13T00:00:00", "db": "CNVD", "id": "CNVD-2011-0160" }, { "date": "2011-01-11T00:00:00", "db": "VULMON", "id": "CVE-2011-0406" }, { "date": "2011-01-09T00:00:00", "db": "BID", "id": "45727" }, { "date": "2011-02-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001026" }, { "date": "2011-01-10T06:32:29", "db": "PACKETSTORM", "id": "97369" }, { "date": "2011-01-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201101-108" }, { "date": "2011-01-11T03:00:06", "db": "NVD", "id": "CVE-2011-0406" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-01-18T00:00:00", "db": "CERT/CC", "id": "VU#180119" }, { "date": "2019-12-09T00:00:00", "db": "CNVD", "id": "CNVD-2011-0160" }, { "date": "2017-08-17T00:00:00", "db": "VULMON", "id": "CVE-2011-0406" }, { "date": "2011-03-16T14:07:00", "db": "BID", "id": "45727" }, { "date": "2011-02-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001026" }, { "date": "2011-01-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201101-108" }, { "date": "2024-11-21T01:23:54.383000", "db": "NVD", "id": "CVE-2011-0406" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201101-108" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView 6.53 remote heap overflow vulnerability", "sources": [ { "db": "CERT/CC", "id": "VU#180119" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "7d760001-463f-11e9-be76-000c29342cb1" }, { "db": "IVD", "id": "76fcfd92-2355-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201101-108" } ], "trust": 1.0 } }
var-201108-0127
Vulnerability from variot
Stack-based buffer overflow in an ActiveX control in KVWebSvr.dll in WellinTech KingView 6.52 and 6.53 allows remote attackers to execute arbitrary code via a long second argument to the ValidateUser method. KingView is a product for building data information service platforms for industrial automation. WellinTech KingView 'KVWebSvr.dll' The ActiveX control handles the parameters of the ValidateUser method with boundary conditions. The remote attacker can exploit the vulnerability to build a malicious WEB page, entice the user to parse, and execute arbitrary code in the application security context. WellinTech KingView ActiveX control is prone to a heap-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Failed attacks will likely cause denial-of-service conditions. KingView 6.53 is vulnerable; other versions may also be affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201108-0127", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "eq", "trust": 3.3, "vendor": "wellintech", "version": "6.53" }, { "model": "kingview", "scope": "eq", "trust": 3.0, "vendor": "wellintech", "version": "6.52" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "kingview", "version": "6.52" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "kingview", "version": "6.53" } ], "sources": [ { "db": "IVD", "id": "b65f53aa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7c1a81-463f-11e9-982d-000c29342cb1" }, { "db": "IVD", "id": "660dcad2-1f9c-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-0956" }, { "db": "BID", "id": "46757" }, { "db": "JVNDB", "id": "JVNDB-2011-003494" }, { "db": "CNNVD", "id": "CNNVD-201108-285" }, { "db": "NVD", "id": "CVE-2011-3142" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wellintech:kingview", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003494" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Carlos Mario Penagos Hollmann", "sources": [ { "db": "BID", "id": "46757" } ], "trust": 0.3 }, "cve": "CVE-2011-3142", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2011-3142", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "b65f53aa-2354-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "7d7c1a81-463f-11e9-982d-000c29342cb1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "660dcad2-1f9c-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-3142", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2011-3142", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201108-285", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "b65f53aa-2354-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "IVD", "id": "7d7c1a81-463f-11e9-982d-000c29342cb1", "trust": 0.2, "value": "CRITICAL" }, { "author": "IVD", "id": "660dcad2-1f9c-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "b65f53aa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7c1a81-463f-11e9-982d-000c29342cb1" }, { "db": "IVD", "id": "660dcad2-1f9c-11e6-abef-000c29c66e3d" }, { "db": "JVNDB", "id": "JVNDB-2011-003494" }, { "db": "CNNVD", "id": "CNNVD-201108-285" }, { "db": "NVD", "id": "CVE-2011-3142" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in an ActiveX control in KVWebSvr.dll in WellinTech KingView 6.52 and 6.53 allows remote attackers to execute arbitrary code via a long second argument to the ValidateUser method. KingView is a product for building data information service platforms for industrial automation. WellinTech KingView \u0027KVWebSvr.dll\u0027 The ActiveX control handles the parameters of the ValidateUser method with boundary conditions. The remote attacker can exploit the vulnerability to build a malicious WEB page, entice the user to parse, and execute arbitrary code in the application security context. WellinTech KingView ActiveX control is prone to a heap-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Failed attacks will likely cause denial-of-service conditions. \nKingView 6.53 is vulnerable; other versions may also be affected", "sources": [ { "db": "NVD", "id": "CVE-2011-3142" }, { "db": "JVNDB", "id": "JVNDB-2011-003494" }, { "db": "CNVD", "id": "CNVD-2011-0956" }, { "db": "BID", "id": "46757" }, { "db": "IVD", "id": "b65f53aa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7c1a81-463f-11e9-982d-000c29342cb1" }, { "db": "IVD", "id": "660dcad2-1f9c-11e6-abef-000c29c66e3d" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-3142", "trust": 3.3 }, { "db": "BID", "id": "46757", "trust": 2.5 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-11-066-01", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-11-074-01", "trust": 2.4 }, { "db": "OSVDB", "id": "72889", "trust": 1.6 }, { "db": "EXPLOIT-DB", "id": "16936", "trust": 1.6 }, { "db": "CNVD", "id": "CNVD-2011-04541", "trust": 1.6 }, { "db": "CNNVD", "id": "CNNVD-201108-285", "trust": 1.2 }, { "db": "CNVD", "id": "CNVD-2011-0956", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2011-003494", "trust": 0.8 }, { "db": "IVD", "id": "B65F53AA-2354-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "7D7C1A81-463F-11E9-982D-000C29342CB1", "trust": 0.2 }, { "db": "IVD", "id": "660DCAD2-1F9C-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "b65f53aa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7c1a81-463f-11e9-982d-000c29342cb1" }, { "db": "IVD", "id": "660dcad2-1f9c-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-0956" }, { "db": "BID", "id": "46757" }, { "db": "JVNDB", "id": "JVNDB-2011-003494" }, { "db": "CNNVD", "id": "CNNVD-201108-285" }, { "db": "NVD", "id": "CVE-2011-3142" } ] }, "id": "VAR-201108-0127", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "b65f53aa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7c1a81-463f-11e9-982d-000c29342cb1" }, { "db": "IVD", "id": "660dcad2-1f9c-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-0956" } ], "trust": 1.7748106 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.2 } ], "sources": [ { "db": "IVD", "id": "b65f53aa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7c1a81-463f-11e9-982d-000c29342cb1" }, { "db": "IVD", "id": "660dcad2-1f9c-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-0956" } ] }, "last_update_date": "2024-11-23T23:06:28.702000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://en.wellintech.com/index.aspx" }, { "title": "\u30a6\u30a7\u30ea\u30f3\u30c6\u30c3\u30af\u30fb\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "trust": 0.8, "url": "http://www.wellintech.co.jp/" }, { "title": "Asian Control Company KingView \u0027KVWebSvr.dll\u0027 ActiveX Control Heap Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/3267" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0956" }, { "db": "JVNDB", "id": "JVNDB-2011-003494" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003494" }, { "db": "NVD", "id": "CVE-2011-3142" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-074-01.pdf" }, { "trust": 2.4, "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-11-066-01.pdf" }, { "trust": 2.2, "url": "http://www.securityfocus.com/bid/46757" }, { "trust": 1.6, "url": "http://www.scadahacker.com/exploits-wellintech-kvwebsvr.html" }, { "trust": 1.6, "url": "http://www.osvdb.org/72889" }, { "trust": 1.6, "url": "http://www.kingview.com/news/detail.aspx?contentid=537" }, { "trust": 1.6, "url": "http://www.exploit-db.com/exploits/16936" }, { "trust": 1.6, "url": "http://www.cnvd.org.cn/vulnerability/cnvd-2011-04541" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3142" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3142" }, { "trust": 0.3, "url": "http://en.wellintech.com/products/detail.aspx?contentid=15" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-0956" }, { "db": "BID", "id": "46757" }, { "db": "JVNDB", "id": "JVNDB-2011-003494" }, { "db": "CNNVD", "id": "CNNVD-201108-285" }, { "db": "NVD", "id": "CVE-2011-3142" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "b65f53aa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7c1a81-463f-11e9-982d-000c29342cb1" }, { "db": "IVD", "id": "660dcad2-1f9c-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-0956" }, { "db": "BID", "id": "46757" }, { "db": "JVNDB", "id": "JVNDB-2011-003494" }, { "db": "CNNVD", "id": "CNNVD-201108-285" }, { "db": "NVD", "id": "CVE-2011-3142" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-08-17T00:00:00", "db": "IVD", "id": "b65f53aa-2354-11e6-abef-000c29c66e3d" }, { "date": "2011-03-11T00:00:00", "db": "IVD", "id": "7d7c1a81-463f-11e9-982d-000c29342cb1" }, { "date": "2011-03-11T00:00:00", "db": "IVD", "id": "660dcad2-1f9c-11e6-abef-000c29c66e3d" }, { "date": "2011-03-11T00:00:00", "db": "CNVD", "id": "CNVD-2011-0956" }, { "date": "2011-03-07T00:00:00", "db": "BID", "id": "46757" }, { "date": "2011-12-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003494" }, { "date": "2011-08-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201108-285" }, { "date": "2011-08-16T21:55:01.273000", "db": "NVD", "id": "CVE-2011-3142" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2011-0956" }, { "date": "2015-04-13T21:01:00", "db": "BID", "id": "46757" }, { "date": "2011-12-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003494" }, { "date": "2011-08-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201108-285" }, { "date": "2024-11-21T01:29:49.830000", "db": "NVD", "id": "CVE-2011-3142" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201108-285" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView KVWebSvr.dll ActiveX Control Stack Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "b65f53aa-2354-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201108-285" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "b65f53aa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7c1a81-463f-11e9-982d-000c29342cb1" }, { "db": "IVD", "id": "660dcad2-1f9c-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201108-285" } ], "trust": 1.2 } }
var-201210-0353
Vulnerability from variot
WellinTech KingView 6.5.3 and earlier uses a weak password-hashing algorithm, which makes it easier for local users to discover credentials by reading an unspecified file. KingView is a product for building a data information service platform for industrial automation. Wellintech KingView has a default authentication credential that an attacker could use to log in to the application for unauthorized access using this undocumented default user. WellinTech KingView is prone to an unauthorized-access vulnerability due to a backdoor in all versions of the application. Attackers can exploit this issue to gain unauthorized access to the affected application. This may aid in further attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201210-0353", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "eq", "trust": 2.5, "vendor": "wellintech", "version": "65.30.17249" }, { "model": "kingview", "scope": "eq", "trust": 2.5, "vendor": "wellintech", "version": "65.30.2010.18018" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "6.5.30.2010.18018" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "3.0" }, { "model": "kingview", "scope": "eq", "trust": 1.6, "vendor": "wellintech", "version": "6.52" }, { "model": "kingview", "scope": "eq", "trust": 1.5, "vendor": "wellintech", "version": "6.53" }, { "model": "kingview", "scope": "lte", "trust": 1.0, "vendor": "wellintech", "version": "6.53" }, { "model": "kingview", "scope": "lte", "trust": 0.8, "vendor": "wellintech", "version": "6.5.3" }, { "model": "kingview", "scope": "lte", "trust": 0.6, "vendor": "wellintech", "version": "\u003c=6.5.3" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "kingview", "version": "3.0" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "kingview", "version": "6.5.30.2010.18018" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "kingview", "version": "6.52" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "kingview", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "kingview", "version": "65.30.2010.18018" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "kingview", "version": "65.30.17249" } ], "sources": [ { "db": "IVD", "id": "4fbf6582-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "79960df6-1f5d-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-4033" }, { "db": "CNVD", "id": "CNVD-2012-5742" }, { "db": "BID", "id": "54729" }, { "db": "JVNDB", "id": "JVNDB-2012-004920" }, { "db": "CNNVD", "id": "CNNVD-201207-595" }, { "db": "NVD", "id": "CVE-2012-4899" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wellintech:kingview", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-004920" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dr. Wesley McGrew of Mississippi State University", "sources": [ { "db": "BID", "id": "54729" }, { "db": "CNNVD", "id": "CNNVD-201207-595" } ], "trust": 0.9 }, "cve": "CVE-2012-4899", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2012-4899", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "4fbf6582-2353-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "79960df6-1f5d-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-4899", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2012-4899", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-201207-595", "trust": 0.6, "value": "LOW" }, { "author": "IVD", "id": "4fbf6582-2353-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "LOW" }, { "author": "IVD", "id": "79960df6-1f5d-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "LOW" } ] } ], "sources": [ { "db": "IVD", "id": "4fbf6582-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "79960df6-1f5d-11e6-abef-000c29c66e3d" }, { "db": "JVNDB", "id": "JVNDB-2012-004920" }, { "db": "CNNVD", "id": "CNNVD-201207-595" }, { "db": "NVD", "id": "CVE-2012-4899" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView 6.5.3 and earlier uses a weak password-hashing algorithm, which makes it easier for local users to discover credentials by reading an unspecified file. KingView is a product for building a data information service platform for industrial automation. Wellintech KingView has a default authentication credential that an attacker could use to log in to the application for unauthorized access using this undocumented default user. WellinTech KingView is prone to an unauthorized-access vulnerability due to a backdoor in all versions of the application. \nAttackers can exploit this issue to gain unauthorized access to the affected application. This may aid in further attacks", "sources": [ { "db": "NVD", "id": "CVE-2012-4899" }, { "db": "JVNDB", "id": "JVNDB-2012-004920" }, { "db": "CNVD", "id": "CNVD-2012-4033" }, { "db": "CNVD", "id": "CNVD-2012-5742" }, { "db": "BID", "id": "54729" }, { "db": "IVD", "id": "4fbf6582-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "79960df6-1f5d-11e6-abef-000c29c66e3d" } ], "trust": 3.33 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-4899", "trust": 3.7 }, { "db": "ICS CERT", "id": "ICSA-12-283-02", "trust": 2.4 }, { "db": "CNNVD", "id": "CNNVD-201207-595", "trust": 1.0 }, { "db": "BID", "id": "54729", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2012-5742", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2012-4033", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-004920", "trust": 0.8 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-12-212-02", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47148", "trust": 0.6 }, { "db": "IVD", "id": "4FBF6582-2353-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "79960DF6-1F5D-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "4fbf6582-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "79960df6-1f5d-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-4033" }, { "db": "CNVD", "id": "CNVD-2012-5742" }, { "db": "BID", "id": "54729" }, { "db": "JVNDB", "id": "JVNDB-2012-004920" }, { "db": "CNNVD", "id": "CNNVD-201207-595" }, { "db": "NVD", "id": "CVE-2012-4899" } ] }, "id": "VAR-201210-0353", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "4fbf6582-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "79960df6-1f5d-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-4033" }, { "db": "CNVD", "id": "CNVD-2012-5742" } ], "trust": 2.1748106 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.6 } ], "sources": [ { "db": "IVD", "id": "4fbf6582-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "79960df6-1f5d-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-4033" }, { "db": "CNVD", "id": "CNVD-2012-5742" } ] }, "last_update_date": "2024-11-23T22:31:30.231000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "June.27,2012-Patch for KingView6.53", "trust": 0.8, "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "title": "Top Page", "trust": 0.8, "url": "http://en.wellintech.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.wellintech.co.jp/" }, { "title": "Patch for WellinTech KingView Backdoor Unauthorized Access Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/67164" }, { "title": "WellinTech KingView weak password algorithm vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/23654" }, { "title": "KV20120322-EN", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45073" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4033" }, { "db": "CNVD", "id": "CNVD-2012-5742" }, { "db": "JVNDB", "id": "JVNDB-2012-004920" }, { "db": "CNNVD", "id": "CNNVD-201207-595" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-004920" }, { "db": "NVD", "id": "CVE-2012-4899" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-283-02.pdf" }, { "trust": 1.0, "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4899" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4899" }, { "trust": 0.6, "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-12-212-02.pdf" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47148" }, { "trust": 0.3, "url": "http://www.kingview.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-4033" }, { "db": "CNVD", "id": "CNVD-2012-5742" }, { "db": "BID", "id": "54729" }, { "db": "JVNDB", "id": "JVNDB-2012-004920" }, { "db": "CNNVD", "id": "CNNVD-201207-595" }, { "db": "NVD", "id": "CVE-2012-4899" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "4fbf6582-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "79960df6-1f5d-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-4033" }, { "db": "CNVD", "id": "CNVD-2012-5742" }, { "db": "BID", "id": "54729" }, { "db": "JVNDB", "id": "JVNDB-2012-004920" }, { "db": "CNNVD", "id": "CNNVD-201207-595" }, { "db": "NVD", "id": "CVE-2012-4899" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-10-12T00:00:00", "db": "IVD", "id": "4fbf6582-2353-11e6-abef-000c29c66e3d" }, { "date": "2012-08-01T00:00:00", "db": "IVD", "id": "79960df6-1f5d-11e6-abef-000c29c66e3d" }, { "date": "2012-08-01T00:00:00", "db": "CNVD", "id": "CNVD-2012-4033" }, { "date": "2012-10-12T00:00:00", "db": "CNVD", "id": "CNVD-2012-5742" }, { "date": "2012-07-30T00:00:00", "db": "BID", "id": "54729" }, { "date": "2012-10-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-004920" }, { "date": "2012-07-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-595" }, { "date": "2012-10-10T18:55:05.550000", "db": "NVD", "id": "CVE-2012-4899" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-10T00:00:00", "db": "CNVD", "id": "CNVD-2012-4033" }, { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2012-5742" }, { "date": "2015-03-19T08:52:00", "db": "BID", "id": "54729" }, { "date": "2012-10-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-004920" }, { "date": "2020-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-595" }, { "date": "2024-11-21T01:43:42.963000", "db": "NVD", "id": "CVE-2012-4899" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201207-595" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView Backdoor unauthorized access vulnerability", "sources": [ { "db": "IVD", "id": "79960df6-1f5d-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-4033" }, { "db": "BID", "id": "54729" }, { "db": "CNNVD", "id": "CNNVD-201207-595" } ], "trust": 1.7 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201207-595" } ], "trust": 0.6 } }
var-201302-0034
Vulnerability from variot
Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet. KingView is a product for building data information service platforms for industrial automation. KingView does not correctly handle exception information, which can lead to a memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. KingView 6.52, 6.53, and 6.55 are vulnerable. ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
TITLE: KingView KingMess Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA52190
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/52190/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=52190
RELEASE DATE: 2013-02-13
DISCUSS ADVISORY: http://secunia.com/advisories/52190/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/52190/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=52190
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in KingView, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to an unspecified error within KingMess and can be exploited to cause a buffer overflow.
Successful exploitation may allow execution of arbitrary code but requires opening a log file.
The vulnerability is reported in versions 6.52, 6.53, and 6.55. Other versions may also be affected.
SOLUTION: Apply patches.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY: CNVD credits Lucas Apa and Carlos Mario Penagos Hollman, IOActive.
ORIGINAL ADVISORY: http://www.cnvd.org.cn/sites/main/preview/ldgg_preview.htm?tid=61735
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201302-0034", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "eq", "trust": 2.5, "vendor": "wellintech", "version": "6.53" }, { "model": "kingview", "scope": "eq", "trust": 2.2, "vendor": "wellintech", "version": "6.55" }, { "model": "kingview", "scope": "eq", "trust": 2.2, "vendor": "wellintech", "version": "6.52" }, { "model": "kingview", "scope": "eq", "trust": 0.8, "vendor": "wellintech", "version": "6.52 (kingmess.exe 65.20.2003.10300)" }, { "model": "kingview", "scope": "eq", "trust": 0.8, "vendor": "wellintech", "version": "6.53 (kingmess.exe 65.20.2003.10400)" }, { "model": "kingview", "scope": "eq", "trust": 0.8, "vendor": "wellintech", "version": "6.55 (kingmess.exe 65.50.2011.18049)" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "6.52" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "6.53" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "kingview", "version": "6.55" } ], "sources": [ { "db": "IVD", "id": "1705f1b6-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-01107" }, { "db": "BID", "id": "57909" }, { "db": "JVNDB", "id": "JVNDB-2013-001582" }, { "db": "CNNVD", "id": "CNNVD-201302-265" }, { "db": "NVD", "id": "CVE-2012-4711" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wellintech:kingview", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-001582" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Researchers Lucas Apa and Carlos Mario Penagos Hollman of IOActive", "sources": [ { "db": "BID", "id": "57909" } ], "trust": 0.3 }, "cve": "CVE-2012-4711", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2012-4711", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "1705f1b6-2353-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-4711", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2012-4711", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201302-265", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "1705f1b6-2353-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "1705f1b6-2353-11e6-abef-000c29c66e3d" }, { "db": "JVNDB", "id": "JVNDB-2013-001582" }, { "db": "CNNVD", "id": "CNNVD-201302-265" }, { "db": "NVD", "id": "CVE-2012-4711" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet. KingView is a product for building data information service platforms for industrial automation. KingView does not correctly handle exception information, which can lead to a memory corruption vulnerability. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. \nKingView 6.52, 6.53, and 6.55 are vulnerable. ----------------------------------------------------------------------\n\nThe final version of the CSI 6.0 has been released. \nFind out why this is not just another Patch Management solution: http://secunia.com/blog/325/\n\n----------------------------------------------------------------------\n\nTITLE:\nKingView KingMess Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA52190\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/52190/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=52190\n\nRELEASE DATE:\n2013-02-13\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/52190/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/52190/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=52190\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in KingView, which can be exploited\nby malicious people to compromise a user\u0027s system. \n\nThe vulnerability is caused due to an unspecified error within\nKingMess and can be exploited to cause a buffer overflow. \n\nSuccessful exploitation may allow execution of arbitrary code but\nrequires opening a log file. \n\nThe vulnerability is reported in versions 6.52, 6.53, and 6.55. Other\nversions may also be affected. \n\nSOLUTION:\nApply patches. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nCNVD credits Lucas Apa and Carlos Mario Penagos Hollman, IOActive. \n\nORIGINAL ADVISORY:\nhttp://www.cnvd.org.cn/sites/main/preview/ldgg_preview.htm?tid=61735\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-4711" }, { "db": "JVNDB", "id": "JVNDB-2013-001582" }, { "db": "CNVD", "id": "CNVD-2013-01107" }, { "db": "BID", "id": "57909" }, { "db": "IVD", "id": "1705f1b6-2353-11e6-abef-000c29c66e3d" }, { "db": "PACKETSTORM", "id": "120294" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-4711", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-13-043-02", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-13-043-02A", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2013-01107", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201302-265", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-001582", "trust": 0.8 }, { "db": "SECUNIA", "id": "52190", "trust": 0.7 }, { "db": "BID", "id": "57909", "trust": 0.3 }, { "db": "IVD", "id": "1705F1B6-2353-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "120294", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "1705f1b6-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-01107" }, { "db": "BID", "id": "57909" }, { "db": "JVNDB", "id": "JVNDB-2013-001582" }, { "db": "PACKETSTORM", "id": "120294" }, { "db": "CNNVD", "id": "CNNVD-201302-265" }, { "db": "NVD", "id": "CVE-2012-4711" } ] }, "id": "VAR-201302-0034", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "1705f1b6-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-01107" } ], "trust": 1.3748106 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "1705f1b6-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-01107" } ] }, "last_update_date": "2024-11-23T23:12:49.997000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://en.wellintech.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.wellintech.co.jp/" }, { "title": "WellinTech KingView Memory Corruption Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/31937" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-01107" }, { "db": "JVNDB", "id": "JVNDB-2013-001582" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-001582" }, { "db": "NVD", "id": "CVE-2012-4711" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "http://ics-cert.us-cert.gov/pdf/icsa-13-043-02.pdf" }, { "trust": 1.0, "url": "http://ics-cert.us-cert.gov/advisories/icsa-13-043-02a" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4711" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4711" }, { "trust": 0.6, "url": "http://secunia.com/advisories/52190" }, { "trust": 0.3, "url": "http://ics-cert.us-cert.gov/pdf/icsa-13-043-02a-b.pdf" }, { "trust": 0.3, "url": "http://www.kingview.com/" }, { "trust": 0.3, "url": "http://www.wellintech.com/" }, { "trust": 0.3, "url": "http://www.kingview.com/download/display1.aspx?id=225" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=52190" }, { "trust": 0.1, "url": "http://www.cnvd.org.cn/sites/main/preview/ldgg_preview.htm?tid=61735" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/blog/325/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/52190/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/52190/#comments" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-01107" }, { "db": "BID", "id": "57909" }, { "db": "JVNDB", "id": "JVNDB-2013-001582" }, { "db": "PACKETSTORM", "id": "120294" }, { "db": "CNNVD", "id": "CNNVD-201302-265" }, { "db": "NVD", "id": "CVE-2012-4711" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "1705f1b6-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-01107" }, { "db": "BID", "id": "57909" }, { "db": "JVNDB", "id": "JVNDB-2013-001582" }, { "db": "PACKETSTORM", "id": "120294" }, { "db": "CNNVD", "id": "CNNVD-201302-265" }, { "db": "NVD", "id": "CVE-2012-4711" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-02-20T00:00:00", "db": "IVD", "id": "1705f1b6-2353-11e6-abef-000c29c66e3d" }, { "date": "2013-02-20T00:00:00", "db": "CNVD", "id": "CNVD-2013-01107" }, { "date": "2013-02-12T00:00:00", "db": "BID", "id": "57909" }, { "date": "2013-02-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-001582" }, { "date": "2013-02-13T04:48:23", "db": "PACKETSTORM", "id": "120294" }, { "date": "2013-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201302-265" }, { "date": "2013-02-15T12:09:27.820000", "db": "NVD", "id": "CVE-2012-4711" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2013-01107" }, { "date": "2013-04-02T15:37:00", "db": "BID", "id": "57909" }, { "date": "2013-02-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-001582" }, { "date": "2013-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201302-265" }, { "date": "2024-11-21T01:43:23.983000", "db": "NVD", "id": "CVE-2012-4711" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201302-265" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingView Memory corruption vulnerability", "sources": [ { "db": "IVD", "id": "1705f1b6-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-01107" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "1705f1b6-2353-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201302-265" } ], "trust": 0.8 } }
var-201205-0115
Vulnerability from variot
WellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent attackers to obtain sensitive information by reading this file. KingSCADA is a SCADA product for the high and mid-end markets. KingSCADA stores the password in the user64 file in Base64 format, and the user can easily decode and access the SCADA server. KingSCADA is prone to a remote information-disclosure vulnerability. Remote attackers can exploit this issue to obtain the password of the affected device. KingSCADA 3.0 is vulnerable; other versions may also be affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201205-0115", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kingview", "scope": "eq", "trust": 2.4, "vendor": "wellintech", "version": "3.0" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "kingview", "version": "3.0" }, { "model": "das usa kingscada", "scope": "eq", "trust": 0.6, "vendor": "icp", "version": "3.0" }, { "model": null, "scope": null, "trust": 0.6, "vendor": "no", "version": null }, { "model": "kingscada", "scope": "eq", "trust": 0.3, "vendor": "wellintech", "version": "3.0" } ], "sources": [ { "db": "IVD", "id": "7d7a93e1-463f-11e9-a373-000c29342cb1" }, { "db": "IVD", "id": "dbcbb6de-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "08e4171e-1f77-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0343" }, { "db": "CNVD", "id": "CNVD-2012-8819" }, { "db": "BID", "id": "51582" }, { "db": "JVNDB", "id": "JVNDB-2012-002373" }, { "db": "CNNVD", "id": "CNNVD-201205-178" }, { "db": "NVD", "id": "CVE-2012-1977" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:wellintech:kingview", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002373" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Alexandr Polyakov and Alexey Sintsov", "sources": [ { "db": "BID", "id": "51582" }, { "db": "CNNVD", "id": "CNNVD-201201-376" } ], "trust": 0.9 }, "cve": "CVE-2012-1977", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2012-1977", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2012-8819", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "7d7a93e1-463f-11e9-a373-000c29342cb1", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "dbcbb6de-2353-11e6-abef-000c29c66e3d", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "08e4171e-1f77-11e6-abef-000c29c66e3d", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1977", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2012-1977", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2012-8819", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201205-178", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "7d7a93e1-463f-11e9-a373-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "dbcbb6de-2353-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "08e4171e-1f77-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "7d7a93e1-463f-11e9-a373-000c29342cb1" }, { "db": "IVD", "id": "dbcbb6de-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "08e4171e-1f77-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-8819" }, { "db": "JVNDB", "id": "JVNDB-2012-002373" }, { "db": "CNNVD", "id": "CNNVD-201205-178" }, { "db": "NVD", "id": "CVE-2012-1977" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent attackers to obtain sensitive information by reading this file. KingSCADA is a SCADA product for the high and mid-end markets. KingSCADA stores the password in the user64 file in Base64 format, and the user can easily decode and access the SCADA server. KingSCADA is prone to a remote information-disclosure vulnerability. \nRemote attackers can exploit this issue to obtain the password of the affected device. \nKingSCADA 3.0 is vulnerable; other versions may also be affected", "sources": [ { "db": "NVD", "id": "CVE-2012-1977" }, { "db": "JVNDB", "id": "JVNDB-2012-002373" }, { "db": "CNVD", "id": "CNVD-2012-0343" }, { "db": "CNVD", "id": "CNVD-2012-8819" }, { "db": "BID", "id": "51582" }, { "db": "IVD", "id": "7d7a93e1-463f-11e9-a373-000c29342cb1" }, { "db": "IVD", "id": "dbcbb6de-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "08e4171e-1f77-11e6-abef-000c29c66e3d" } ], "trust": 3.51 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1977", "trust": 3.9 }, { "db": "ICS CERT", "id": "ICSA-12-129-01", "trust": 2.7 }, { "db": "BID", "id": "51582", "trust": 1.5 }, { "db": "CNNVD", "id": "CNNVD-201205-178", "trust": 1.2 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-12-020-06", "trust": 1.1 }, { "db": "CNVD", "id": "CNVD-2012-8819", "trust": 1.0 }, { "db": "CNVD", "id": "CNVD-2012-0343", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-002373", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201201-376", "trust": 0.6 }, { "db": "IVD", "id": "7D7A93E1-463F-11E9-A373-000C29342CB1", "trust": 0.2 }, { "db": "IVD", "id": "DBCBB6DE-2353-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "08E4171E-1F77-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "7d7a93e1-463f-11e9-a373-000c29342cb1" }, { "db": "IVD", "id": "dbcbb6de-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "08e4171e-1f77-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0343" }, { "db": "CNVD", "id": "CNVD-2012-8819" }, { "db": "BID", "id": "51582" }, { "db": "JVNDB", "id": "JVNDB-2012-002373" }, { "db": "CNNVD", "id": "CNNVD-201201-376" }, { "db": "CNNVD", "id": "CNNVD-201205-178" }, { "db": "NVD", "id": "CVE-2012-1977" } ] }, "id": "VAR-201205-0115", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7d7a93e1-463f-11e9-a373-000c29342cb1" }, { "db": "IVD", "id": "dbcbb6de-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "08e4171e-1f77-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0343" }, { "db": "CNVD", "id": "CNVD-2012-8819" } ], "trust": 2.5249368666666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.8 } ], "sources": [ { "db": "IVD", "id": "7d7a93e1-463f-11e9-a373-000c29342cb1" }, { "db": "IVD", "id": "dbcbb6de-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "08e4171e-1f77-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0343" }, { "db": "CNVD", "id": "CNVD-2012-8819" } ] }, "last_update_date": "2024-11-23T22:23:24.381000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://en.wellintech.com/index.aspx" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.wellintech.co.jp" }, { "title": "WellinTech KingSCADA Trust Management Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/36034" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-8819" }, { "db": "JVNDB", "id": "JVNDB-2012-002373" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-255", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002373" }, { "db": "NVD", "id": "CVE-2012-1977" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-129-01.pdf" }, { "trust": 2.2, "url": "http://dsecrg.com/pages/vul/show.php?id=405" }, { "trust": 1.1, "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-12-020-06.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1977" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1977" }, { "trust": 0.6, "url": "http://www.adobe.com/support/security/bulletins/apsb11-13.html" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/51582" }, { "trust": 0.3, "url": "http://en.wellintech.com/products/detail.aspx?contentid=14" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0343" }, { "db": "CNVD", "id": "CNVD-2012-8819" }, { "db": "BID", "id": "51582" }, { "db": "JVNDB", "id": "JVNDB-2012-002373" }, { "db": "CNNVD", "id": "CNNVD-201201-376" }, { "db": "CNNVD", "id": "CNNVD-201205-178" }, { "db": "NVD", "id": "CVE-2012-1977" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7d7a93e1-463f-11e9-a373-000c29342cb1" }, { "db": "IVD", "id": "dbcbb6de-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "08e4171e-1f77-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0343" }, { "db": "CNVD", "id": "CNVD-2012-8819" }, { "db": "BID", "id": "51582" }, { "db": "JVNDB", "id": "JVNDB-2012-002373" }, { "db": "CNNVD", "id": "CNNVD-201201-376" }, { "db": "CNNVD", "id": "CNNVD-201205-178" }, { "db": "NVD", "id": "CVE-2012-1977" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-05-10T00:00:00", "db": "IVD", "id": "7d7a93e1-463f-11e9-a373-000c29342cb1" }, { "date": "2012-05-10T00:00:00", "db": "IVD", "id": "dbcbb6de-2353-11e6-abef-000c29c66e3d" }, { "date": "2012-02-01T00:00:00", "db": "IVD", "id": "08e4171e-1f77-11e6-abef-000c29c66e3d" }, { "date": "2012-02-01T00:00:00", "db": "CNVD", "id": "CNVD-2012-0343" }, { "date": "2012-05-10T00:00:00", "db": "CNVD", "id": "CNVD-2012-8819" }, { "date": "2012-01-20T00:00:00", "db": "BID", "id": "51582" }, { "date": "2012-05-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002373" }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-376" }, { "date": "2012-05-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-178" }, { "date": "2012-05-09T10:33:15.020000", "db": "NVD", "id": "CVE-2012-1977" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-02-01T00:00:00", "db": "CNVD", "id": "CNVD-2012-0343" }, { "date": "2012-05-10T00:00:00", "db": "CNVD", "id": "CNVD-2012-8819" }, { "date": "2012-05-08T22:10:00", "db": "BID", "id": "51582" }, { "date": "2012-09-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002373" }, { "date": "2012-02-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-376" }, { "date": "2012-05-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-178" }, { "date": "2024-11-21T01:38:13.353000", "db": "NVD", "id": "CVE-2012-1977" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201201-376" }, { "db": "CNNVD", "id": "CNNVD-201205-178" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WellinTech KingSCADA Trust Management Vulnerability", "sources": [ { "db": "IVD", "id": "7d7a93e1-463f-11e9-a373-000c29342cb1" }, { "db": "IVD", "id": "dbcbb6de-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-8819" }, { "db": "CNNVD", "id": "CNNVD-201205-178" } ], "trust": 1.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Trust management", "sources": [ { "db": "IVD", "id": "7d7a93e1-463f-11e9-a373-000c29342cb1" }, { "db": "IVD", "id": "dbcbb6de-2353-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "08e4171e-1f77-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201205-178" } ], "trust": 1.2 } }
CVE-2012-1819 (GCVE-0-2012-1819)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://en.wellintech.com/news/detail.aspx?contentid=168 | x_refsource_CONFIRM | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf | x_refsource_MISC | |
http://www.securityfocus.com/bid/53316 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75309 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:08:38.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=168" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf" }, { "name": "53316", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53316" }, { "name": "kingview-dll-code-execution(75309)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75309" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in WellinTech KingView 6.53 allows local users to gain privileges via a Trojan horse DLL in the current working directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-13T18:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=168" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf" }, { "name": "53316", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53316" }, { "name": "kingview-dll-code-execution(75309)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75309" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-1819", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in WellinTech KingView 6.53 allows local users to gain privileges via a Trojan horse DLL in the current working directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://en.wellintech.com/news/detail.aspx?contentid=168", "refsource": "CONFIRM", "url": "http://en.wellintech.com/news/detail.aspx?contentid=168" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf" }, { "name": "53316", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53316" }, { "name": "kingview-dll-code-execution(75309)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75309" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-1819", "datePublished": "2012-05-02T22:00:00", "dateReserved": "2012-03-21T00:00:00", "dateUpdated": "2024-08-06T19:08:38.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2560 (GCVE-0-2012-2560)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | x_refsource_MISC | |
http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:34:25.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in WellinTech KingView 6.53 allows remote attackers to read arbitrary files via a crafted HTTP request to port 8001." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-05T01:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-2560", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in WellinTech KingView 6.53 allows remote attackers to read arbitrary files via a crafted HTTP request to port 8001." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "name": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653", "refsource": "CONFIRM", "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-2560", "datePublished": "2012-07-05T01:00:00Z", "dateReserved": "2012-05-09T00:00:00Z", "dateUpdated": "2024-09-16T19:25:49.875Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1830 (GCVE-0-2012-1830)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | x_refsource_MISC | |
http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:08:38.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-05T01:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-1830", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "name": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653", "refsource": "CONFIRM", "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-1830", "datePublished": "2012-07-05T01:00:00Z", "dateReserved": "2012-03-21T00:00:00Z", "dateUpdated": "2024-09-17T02:46:36.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1977 (GCVE-0-2012-1977)
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
WellinTech | KingSCADA |
Version: 3.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.498Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dsecrg.com/pages/vul/show.php?id=405" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-129-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "KingSCADA", "vendor": "WellinTech", "versions": [ { "status": "affected", "version": "3.0" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Independent researchers Alexandr Polyakov and Alexey Sintsov from DSecRG identified an unsecure password encryption vulnerability in WellinTech KingSCADA application." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eWellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent attackers to obtain sensitive information by reading this file.\u003c/p\u003e" } ], "value": "WellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent attackers to obtain sensitive information by reading this file." } ], "metrics": [ { "cvssV2_0": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-311", "description": "CWE-311", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-26T21:30:25.305Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-12-129-01" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eWellinTech has provided the following link to the latest version of KingSCADA: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://download.kingview.com/software/KingSCADA/EN/KingSCADA3.1_2012-04-16EN.rar\"\u003ehttp://download.kingview.com/software/KingSCADA/EN/KingSCADA3.1_2012-04-16EN.rar\u003c/a\u003e.\u003c/p\u003e\u003cp\u003eAccording to WellinTech, this new version securely hashes passwords.\u003c/p\u003e" } ], "value": "WellinTech has provided the following link to the latest version of KingSCADA: http://download.kingview.com/software/KingSCADA/EN/KingSCADA3.1_2012-04-16EN.rar .\n\nAccording to WellinTech, this new version securely hashes passwords." } ], "source": { "advisory": "ICSA-12-129-01", "discovery": "EXTERNAL" }, "title": "WellinTech KingSCADA Missing Encryption of Sensitive Data", "x_generator": { "engine": "Vulnogram 0.2.0" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2012-1977", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent attackers to obtain sensitive information by reading this file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dsecrg.com/pages/vul/show.php?id=405", "refsource": "MISC", "url": "http://dsecrg.com/pages/vul/show.php?id=405" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-129-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-129-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2012-1977", "datePublished": "2012-05-09T10:00:00Z", "dateReserved": "2012-03-30T00:00:00Z", "dateUpdated": "2025-06-26T21:30:25.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-6128 (GCVE-0-2013-6128)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.exploit-db.com/exploits/28085/ | exploit, x_refsource_EXPLOIT-DB | |
http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:29:42.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28085", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/28085/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The KCHARTXYLib.KChartXY ActiveX control in KChartXY.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict SaveToFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the single pathname argument, as demonstrated by a directory traversal attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-10-25T20:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "28085", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/28085/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-6128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The KCHARTXYLib.KChartXY ActiveX control in KChartXY.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict SaveToFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the single pathname argument, as demonstrated by a directory traversal attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28085", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/28085/" }, { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-6128", "datePublished": "2013-10-25T20:00:00Z", "dateReserved": "2013-10-15T00:00:00Z", "dateUpdated": "2024-09-16T20:47:34.907Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4536 (GCVE-0-2011-4536)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.zerodayinitiative.com/advisories/ZDI-11-351/ | x_refsource_MISC | |
http://www.osvdb.org/77992 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/47339 | third-party-advisory, x_refsource_SECUNIA | |
http://en.wellintech.com/news/detail.aspx?contentid=166 | x_refsource_CONFIRM | |
http://www.kingview.com/news/detail.aspx?contentid=587 | x_refsource_CONFIRM | |
http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:18.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-351/" }, { "name": "77992", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/77992" }, { "name": "47339", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47339" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=166" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=587" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nettransdll.dll in HistorySvr.exe (aka HistoryServer.exe) in WellinTech KingView 6.53 and 65.30.2010.18018 allows remote attackers to execute arbitrary code via a crafted op-code 3 packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-12-27T02:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-351/" }, { "name": "77992", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/77992" }, { "name": "47339", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47339" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=166" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=587" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4536", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in nettransdll.dll in HistorySvr.exe (aka HistoryServer.exe) in WellinTech KingView 6.53 and 65.30.2010.18018 allows remote attackers to execute arbitrary code via a crafted op-code 3 packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-351/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-351/" }, { "name": "77992", "refsource": "OSVDB", "url": "http://www.osvdb.org/77992" }, { "name": "47339", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47339" }, { "name": "http://en.wellintech.com/news/detail.aspx?contentid=166", "refsource": "CONFIRM", "url": "http://en.wellintech.com/news/detail.aspx?contentid=166" }, { "name": "http://www.kingview.com/news/detail.aspx?contentid=587", "refsource": "CONFIRM", "url": "http://www.kingview.com/news/detail.aspx?contentid=587" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4536", "datePublished": "2011-12-27T02:00:00Z", "dateReserved": "2011-11-22T00:00:00Z", "dateUpdated": "2024-09-16T23:20:33.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4899 (GCVE-0-2012-4899)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | x_refsource_MISC | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:50:17.973Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "WellinTech KingView 6.5.3 and earlier uses a weak password-hashing algorithm, which makes it easier for local users to discover credentials by reading an unspecified file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-10-10T18:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-4899", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WellinTech KingView 6.5.3 and earlier uses a weak password-hashing algorithm, which makes it easier for local users to discover credentials by reading an unspecified file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653", "refsource": "MISC", "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-4899", "datePublished": "2012-10-10T18:00:00Z", "dateReserved": "2012-09-12T00:00:00Z", "dateUpdated": "2024-09-16T22:19:42.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1832 (GCVE-0-2012-1832)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | x_refsource_MISC | |
http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:08:38.489Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "WellinTech KingView 6.53 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted packet to (1) TCP or (2) UDP port 2001." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-05T01:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-1832", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WellinTech KingView 6.53 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted packet to (1) TCP or (2) UDP port 2001." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "name": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653", "refsource": "CONFIRM", "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-1832", "datePublished": "2012-07-05T01:00:00Z", "dateReserved": "2012-03-21T00:00:00Z", "dateUpdated": "2024-09-17T04:19:22.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-3142 (GCVE-0-2011-3142)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.scadahacker.com/exploits-wellintech-kvwebsvr.html | x_refsource_MISC | |
http://www.us-cert.gov/control_systems/pdf/ICSA-11-074-01.pdf | x_refsource_MISC | |
http://www.cnvd.org.cn/vulnerability/CNVD-2011-04541 | x_refsource_MISC | |
http://www.exploit-db.com/exploits/16936 | exploit, x_refsource_EXPLOIT-DB | |
http://www.securityfocus.com/bid/46757 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/72889 | vdb-entry, x_refsource_OSVDB | |
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-066-01.pdf | x_refsource_MISC | |
http://www.kingview.com/news/detail.aspx?contentid=537 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:22:27.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.scadahacker.com/exploits-wellintech-kvwebsvr.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-074-01.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-04541" }, { "name": "16936", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/16936" }, { "name": "46757", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46757" }, { "name": "72889", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/72889" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-066-01.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=537" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in an ActiveX control in KVWebSvr.dll in WellinTech KingView 6.52 and 6.53 allows remote attackers to execute arbitrary code via a long second argument to the ValidateUser method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-08-16T21:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.scadahacker.com/exploits-wellintech-kvwebsvr.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-074-01.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-04541" }, { "name": "16936", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/16936" }, { "name": "46757", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46757" }, { "name": "72889", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/72889" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-066-01.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=537" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-3142", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in an ActiveX control in KVWebSvr.dll in WellinTech KingView 6.52 and 6.53 allows remote attackers to execute arbitrary code via a long second argument to the ValidateUser method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.scadahacker.com/exploits-wellintech-kvwebsvr.html", "refsource": "MISC", "url": "http://www.scadahacker.com/exploits-wellintech-kvwebsvr.html" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-074-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-074-01.pdf" }, { "name": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-04541", "refsource": "MISC", "url": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-04541" }, { "name": "16936", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/16936" }, { "name": "46757", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46757" }, { "name": "72889", "refsource": "OSVDB", "url": "http://www.osvdb.org/72889" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-066-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-066-01.pdf" }, { "name": "http://www.kingview.com/news/detail.aspx?contentid=537", "refsource": "CONFIRM", "url": "http://www.kingview.com/news/detail.aspx?contentid=537" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-3142", "datePublished": "2011-08-16T21:00:00Z", "dateReserved": "2011-08-16T00:00:00Z", "dateUpdated": "2024-09-17T01:20:36.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1831 (GCVE-0-2012-1831)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | x_refsource_MISC | |
http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:08:38.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-05T01:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-1831", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "name": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653", "refsource": "CONFIRM", "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-1831", "datePublished": "2012-07-05T01:00:00Z", "dateReserved": "2012-03-21T00:00:00Z", "dateUpdated": "2024-09-16T18:43:21.581Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-6127 (GCVE-0-2013-6127)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.exploit-db.com/exploits/28084/ | exploit, x_refsource_EXPLOIT-DB | |
http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:29:43.044Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28084", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/28084/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The SUPERGRIDLib.SuperGrid ActiveX control in SuperGrid.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict ReplaceDBFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the two pathname arguments, as demonstrated by a directory traversal attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-10-25T20:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "28084", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/28084/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-6127", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SUPERGRIDLib.SuperGrid ActiveX control in SuperGrid.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict ReplaceDBFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the two pathname arguments, as demonstrated by a directory traversal attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28084", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/28084/" }, { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-6127", "datePublished": "2013-10-25T20:00:00Z", "dateReserved": "2013-10-15T00:00:00Z", "dateUpdated": "2024-09-17T00:37:21.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0406 (GCVE-0-2011-0406)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/64559 | vdb-entry, x_refsource_XF | |
http://www.exploit-db.com/exploits/15957 | exploit, x_refsource_EXPLOIT-DB | |
http://www.securityfocus.com/bid/45727 | vdb-entry, x_refsource_BID | |
http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108 | x_refsource_MISC | |
http://secunia.com/advisories/42851 | third-party-advisory, x_refsource_SECUNIA | |
http://osvdb.org/70366 | vdb-entry, x_refsource_OSVDB | |
http://securityreason.com/securityalert/8134 | third-party-advisory, x_refsource_SREASON | |
http://www.vupen.com/english/advisories/2011/0063 | vdb-entry, x_refsource_VUPEN | |
http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html | x_refsource_MISC | |
http://www.kingview.com/news/detail.aspx?contentid=528 | x_refsource_CONFIRM | |
http://www.kb.cert.org/vuls/id/180119 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.939Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "kingview-historysvr-bo(64559)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64559" }, { "name": "15957", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/15957" }, { "name": "45727", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108" }, { "name": "42851", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42851" }, { "name": "70366", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/70366" }, { "name": "8134", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8134" }, { "name": "ADV-2011-0063", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0063" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=528" }, { "name": "VU#180119", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/180119" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in HistorySvr.exe in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a long request to TCP port 777." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "kingview-historysvr-bo(64559)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64559" }, { "name": "15957", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/15957" }, { "name": "45727", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45727" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108" }, { "name": "42851", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42851" }, { "name": "70366", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/70366" }, { "name": "8134", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8134" }, { "name": "ADV-2011-0063", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0063" }, { "tags": [ "x_refsource_MISC" ], "url": "http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=528" }, { "name": "VU#180119", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/180119" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0406", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in HistorySvr.exe in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a long request to TCP port 777." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "kingview-historysvr-bo(64559)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64559" }, { "name": "15957", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/15957" }, { "name": "45727", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45727" }, { "name": "http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108", "refsource": "MISC", "url": "http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108" }, { "name": "42851", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42851" }, { "name": "70366", "refsource": "OSVDB", "url": "http://osvdb.org/70366" }, { "name": "8134", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8134" }, { "name": "ADV-2011-0063", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0063" }, { "name": "http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html", "refsource": "MISC", "url": "http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html" }, { "name": "http://www.kingview.com/news/detail.aspx?contentid=528", "refsource": "CONFIRM", "url": "http://www.kingview.com/news/detail.aspx?contentid=528" }, { "name": "VU#180119", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/180119" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0406", "datePublished": "2011-01-11T01:00:00", "dateReserved": "2011-01-10T00:00:00", "dateUpdated": "2024-08-06T21:51:08.939Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4711 (GCVE-0-2012-4711)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://ics-cert.us-cert.gov/pdf/ICSA-13-043-02.pdf | x_refsource_MISC | |
http://ics-cert.us-cert.gov/advisories/ICSA-13-043-02A | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:42:55.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-043-02.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-043-02A" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-05-21T09:00:00", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-043-02.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-043-02A" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2012-4711", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-043-02.pdf", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-043-02.pdf" }, { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-043-02A", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-043-02A" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2012-4711", "datePublished": "2013-02-15T11:00:00", "dateReserved": "2012-08-28T00:00:00", "dateUpdated": "2024-08-06T20:42:55.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }