Vulnerabilites related to realflex - realwin
var-201104-0287
Vulnerability from variot

Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified "On_FC_BINFILE_FCS_FILE", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910. (2)On_FC_CTAGLIST_FCS_CADDTAG (3)On_FC_CTAGLIST_FCS_CDELTAG (4)On_FC_CTAGLIST_FCS_ADDTAGMS (5)On_FC_RFUSER_FCS_LOGIN (6)unspecified "On_FC_BINFILE_FCS_FILE (7)On_FC_CGETTAG_FCS_GETTELEMETRY (8)On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY (9)On_FC_CGETTAG_FCS_SETTELEMETRY (10)On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY (11)On_FC_SCRIPT_FCS_STARTPROG packets to port 910. DATAC RealWin is a SCADA server product that operates a single PC or multiple PCs over a TCP/IP network. DATAC RealWin SCADA Server can exploit vulnerabilities for buffer overflow attacks due to incorrect validation of user-supplied input. Successful exploitation of a vulnerability can execute arbitrary code in an application security context. DATAC RealWin is prone to multiple remote buffer-overflow vulnerabilities because of a failure to properly bounds check user-supplied input. Failed exploit attempts will cause a denial-of-service condition. DATAC RealWin versions 2.1 and prior are vulnerable; other versions may also be affected. ----------------------------------------------------------------------

Meet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March).

http://secunia.com/company/events/mms_2011/


TITLE: RealWin FlexWin Connection Packet Processing Buffer Overflow Vulnerabilities

SECUNIA ADVISORY ID: SA43848

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43848/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43848

RELEASE DATE: 2011-03-22

DISCUSS ADVISORY: http://secunia.com/advisories/43848/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/43848/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=43848

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: Luigi Auriemma has discovered multiple vulnerabilities in RealWin, which can be exploited by malicious people to compromise a vulnerable system.

6) An input validation error when processing "On_FC_MISC_FCS_MSGBROADCAST" packets can be exploited to cause a heap-based buffer overflow via a specially crafted packet sent to TCP port 910.

7) An input validation error when processing "On_FC_MISC_FCS_MSGSEND" packets can be exploited to cause a heap-based buffer overflow via a specially crafted packet sent to TCP port 910.

The vulnerabilities are confirmed in version 2.1 Build 6.1.10.10.

SOLUTION: Restrict access to trusted hosts only (e.g. via network access control lists).

PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma

ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/realwin_2-adv.txt http://aluigi.altervista.org/adv/realwin_3-adv.txt http://aluigi.altervista.org/adv/realwin_4-adv.txt http://aluigi.altervista.org/adv/realwin_5-adv.txt http://aluigi.altervista.org/adv/realwin_6-adv.txt http://aluigi.altervista.org/adv/realwin_7-adv.txt http://aluigi.altervista.org/adv/realwin_8-adv.txt

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201104-0287",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "realwin",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "realflex",
        "version": "2.0"
      },
      {
        "model": "realwin",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "realflex",
        "version": "1.06"
      },
      {
        "model": "control international realwin scada server",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "datac",
        "version": "2.1.10"
      },
      {
        "model": "realwin",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "realflex",
        "version": "2.1"
      },
      {
        "model": "control international realwin scada server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "datac",
        "version": "1.06"
      },
      {
        "model": "control international realwin scada server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "datac",
        "version": "2.0"
      },
      {
        "model": "control international realwin scada server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "datac",
        "version": "2.1"
      },
      {
        "model": "realwin",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "realflex",
        "version": "2.1.12"
      },
      {
        "model": "control international realwin scada server (build",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "datac",
        "version": "2.16.1.10.10)"
      },
      {
        "model": "realwin",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "realflex",
        "version": "2.1"
      },
      {
        "model": "control international realwin scada server (build",
        "scope": "eq",
        "trust": 0.4,
        "vendor": "datac",
        "version": "2.16.1.10.10)*"
      },
      {
        "model": "control international realwin scada server",
        "scope": "eq",
        "trust": 0.4,
        "vendor": "datac",
        "version": "1.06*"
      },
      {
        "model": "control international realwin scada server",
        "scope": "eq",
        "trust": 0.4,
        "vendor": "datac",
        "version": "2.0*"
      },
      {
        "model": "control international realwin scada server",
        "scope": "eq",
        "trust": 0.4,
        "vendor": "datac",
        "version": "2.1*"
      },
      {
        "model": "control international realwin scada server (build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "datac",
        "version": "2.16.1.10.10"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      },
      {
        "db": "BID",
        "id": "46937"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-1563"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:realflex:realwin",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001669"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Luigi Auriemma",
    "sources": [
      {
        "db": "BID",
        "id": "46937"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2011-1563",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2011-1563",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2011-1563",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2011-1563",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201104-025",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-1563"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified \"On_FC_BINFILE_FCS_*FILE\", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910. (2)On_FC_CTAGLIST_FCS_CADDTAG (3)On_FC_CTAGLIST_FCS_CDELTAG (4)On_FC_CTAGLIST_FCS_ADDTAGMS (5)On_FC_RFUSER_FCS_LOGIN (6)unspecified \"On_FC_BINFILE_FCS_*FILE (7)On_FC_CGETTAG_FCS_GETTELEMETRY (8)On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY (9)On_FC_CGETTAG_FCS_SETTELEMETRY (10)On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY (11)On_FC_SCRIPT_FCS_STARTPROG packets to port 910. DATAC RealWin is a SCADA server product that operates a single PC or multiple PCs over a TCP/IP network. DATAC RealWin SCADA Server can exploit vulnerabilities for buffer overflow attacks due to incorrect validation of user-supplied input. Successful exploitation of a vulnerability can execute arbitrary code in an application security context. DATAC RealWin is prone to multiple remote buffer-overflow vulnerabilities because of a failure to properly bounds check user-supplied input. Failed exploit attempts will cause a  denial-of-service condition. \nDATAC RealWin versions 2.1 and prior are vulnerable; other versions may also be affected. ----------------------------------------------------------------------\n\n\nMeet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March). \n\nhttp://secunia.com/company/events/mms_2011/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nRealWin FlexWin Connection Packet Processing Buffer Overflow\nVulnerabilities\n\nSECUNIA ADVISORY ID:\nSA43848\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/43848/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43848\n\nRELEASE DATE:\n2011-03-22\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/43848/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/43848/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43848\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nLuigi Auriemma has discovered multiple vulnerabilities in RealWin,\nwhich can be exploited by malicious people to compromise a vulnerable\nsystem. \n\n6) An input validation error when processing\n\"On_FC_MISC_FCS_MSGBROADCAST\" packets can be exploited to cause a\nheap-based buffer overflow via a specially crafted packet sent to TCP\nport 910. \n\n7) An input validation error when processing \"On_FC_MISC_FCS_MSGSEND\"\npackets can be exploited to cause a heap-based buffer overflow via a\nspecially crafted packet sent to TCP port 910. \n\nThe vulnerabilities are confirmed in version 2.1 Build 6.1.10.10. \n\nSOLUTION:\nRestrict access to trusted hosts only (e.g. via network access\ncontrol lists). \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/realwin_2-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_3-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_4-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_5-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_6-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_7-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_8-adv.txt\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-1563"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001669"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      },
      {
        "db": "BID",
        "id": "46937"
      },
      {
        "db": "IVD",
        "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "PACKETSTORM",
        "id": "99614"
      }
    ],
    "trust": 2.88
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "46937",
        "trust": 3.3
      },
      {
        "db": "NVD",
        "id": "CVE-2011-1563",
        "trust": 3.1
      },
      {
        "db": "SECUNIA",
        "id": "43848",
        "trust": 2.5
      },
      {
        "db": "ICS CERT ALERT",
        "id": "ICS-ALERT-11-080-04",
        "trust": 2.4
      },
      {
        "db": "VUPEN",
        "id": "ADV-2011-0742",
        "trust": 1.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "17025",
        "trust": 1.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159",
        "trust": 1.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-025",
        "trust": 1.0
      },
      {
        "db": "SREASON",
        "id": "8176",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001669",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "HTTP://WWW.US-CERT.GOV/CONTROL_SYSTEMS/PDF/ICS-ALERT-11-080-04.PDF",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "7D79F7A1-463F-11E9-ACD1-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "FC45BAAC-1F9A-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "99614",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      },
      {
        "db": "BID",
        "id": "46937"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001669"
      },
      {
        "db": "PACKETSTORM",
        "id": "99614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-1563"
      }
    ]
  },
  "id": "VAR-201104-0287",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      }
    ],
    "trust": 1.561607135
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:42:51.953000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Alert Update: RealWin vulnerability resolved",
        "trust": 0.8,
        "url": "http://realflex.com/news/alert-update-realwin-vulnerability-resolved"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001669"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001669"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-1563"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-11-080-04.pdf"
      },
      {
        "trust": 2.4,
        "url": "http://secunia.com/advisories/43848"
      },
      {
        "trust": 2.4,
        "url": "http://www.securityfocus.com/bid/46937"
      },
      {
        "trust": 1.9,
        "url": "http://aluigi.org/adv/realwin_2-adv.txt"
      },
      {
        "trust": 1.9,
        "url": "http://aluigi.org/adv/realwin_3-adv.txt"
      },
      {
        "trust": 1.9,
        "url": "http://aluigi.org/adv/realwin_4-adv.txt"
      },
      {
        "trust": 1.9,
        "url": "http://aluigi.org/adv/realwin_5-adv.txt"
      },
      {
        "trust": 1.9,
        "url": "http://aluigi.org/adv/realwin_7-adv.txt"
      },
      {
        "trust": 1.9,
        "url": "http://aluigi.org/adv/realwin_8-adv.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.vupen.com/english/advisories/2011/0742"
      },
      {
        "trust": 1.6,
        "url": "http://www.exploit-db.com/exploits/17025"
      },
      {
        "trust": 1.0,
        "url": "http://securityreason.com/securityalert/8176"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1563"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1563"
      },
      {
        "trust": 0.6,
        "url": "http://aluigi.org/adv/realwin_1-adv.txthttp"
      },
      {
        "trust": 0.3,
        "url": "http://aluigi.org/adv/realwin_6-adv.txt"
      },
      {
        "trust": 0.3,
        "url": "http://www.dataconline.com/software/realwin.php"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/517080"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/realwin_8-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/evm/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/company/events/mms_2011/"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/realwin_2-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/43848/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/realwin_5-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/realwin_3-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/realwin_6-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/realwin_4-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/43848/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/realwin_7-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43848"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      },
      {
        "db": "BID",
        "id": "46937"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001669"
      },
      {
        "db": "PACKETSTORM",
        "id": "99614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-1563"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      },
      {
        "db": "BID",
        "id": "46937"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001669"
      },
      {
        "db": "PACKETSTORM",
        "id": "99614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-1563"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-03-22T00:00:00",
        "db": "IVD",
        "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1"
      },
      {
        "date": "2011-03-22T00:00:00",
        "db": "IVD",
        "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2011-03-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      },
      {
        "date": "2011-03-21T00:00:00",
        "db": "BID",
        "id": "46937"
      },
      {
        "date": "2011-06-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-001669"
      },
      {
        "date": "2011-03-22T02:52:36",
        "db": "PACKETSTORM",
        "id": "99614"
      },
      {
        "date": "2011-04-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201104-025"
      },
      {
        "date": "2011-04-05T15:19:35.930000",
        "db": "NVD",
        "id": "CVE-2011-1563"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-03-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      },
      {
        "date": "2015-04-13T21:01:00",
        "db": "BID",
        "id": "46937"
      },
      {
        "date": "2011-06-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-001669"
      },
      {
        "date": "2011-04-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201104-025"
      },
      {
        "date": "2024-11-21T01:26:36.460000",
        "db": "NVD",
        "id": "CVE-2011-1563"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-025"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "DATAC RealFlex RealWin of  HMI Application stack-based buffer overflow vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001669"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-025"
      }
    ],
    "trust": 1.0
  }
}

var-201104-0288
Vulnerability from variot

Multiple integer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via crafted (1) On_FC_MISC_FCS_MSGBROADCAST and (2) On_FC_MISC_FCS_MSGSEND packets, which trigger a heap-based buffer overflow. DATAC RealWin is a SCADA server product that operates a single PC or multiple PCs over a TCP/IP network. DATAC RealWin SCADA Server can exploit vulnerabilities for buffer overflow attacks due to incorrect validation of user-supplied input. Successful exploitation of a vulnerability can execute arbitrary code in an application security context. DATAC RealWin is prone to multiple remote buffer-overflow vulnerabilities because of a failure to properly bounds check user-supplied input. Failed exploit attempts will cause a denial-of-service condition. DATAC RealWin versions 2.1 and prior are vulnerable; other versions may also be affected. ----------------------------------------------------------------------

Meet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March).

http://secunia.com/company/events/mms_2011/


TITLE: RealWin FlexWin Connection Packet Processing Buffer Overflow Vulnerabilities

SECUNIA ADVISORY ID: SA43848

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43848/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43848

RELEASE DATE: 2011-03-22

DISCUSS ADVISORY: http://secunia.com/advisories/43848/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/43848/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=43848

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: Luigi Auriemma has discovered multiple vulnerabilities in RealWin, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerabilities are confirmed in version 2.1 Build 6.1.10.10.

SOLUTION: Restrict access to trusted hosts only (e.g. via network access control lists).

PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma

ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/realwin_2-adv.txt http://aluigi.altervista.org/adv/realwin_3-adv.txt http://aluigi.altervista.org/adv/realwin_4-adv.txt http://aluigi.altervista.org/adv/realwin_5-adv.txt http://aluigi.altervista.org/adv/realwin_6-adv.txt http://aluigi.altervista.org/adv/realwin_7-adv.txt http://aluigi.altervista.org/adv/realwin_8-adv.txt

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201104-0288",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "realwin",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "realflex",
        "version": "2.0"
      },
      {
        "model": "realwin",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "realflex",
        "version": "1.06"
      },
      {
        "model": "realwin",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "realflex",
        "version": "2.1"
      },
      {
        "model": "control international realwin scada server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "datac",
        "version": "1.06"
      },
      {
        "model": "control international realwin scada server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "datac",
        "version": "2.0"
      },
      {
        "model": "control international realwin scada server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "datac",
        "version": "2.1"
      },
      {
        "model": "control international realwin scada server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "datac",
        "version": "2.1.10"
      },
      {
        "model": "realwin",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "realflex",
        "version": "2.1.12"
      },
      {
        "model": "control international realwin scada server (build",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "datac",
        "version": "2.16.1.10.10)"
      },
      {
        "model": "realwin",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "realflex",
        "version": "2.1"
      },
      {
        "model": "control international realwin scada server (build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "datac",
        "version": "2.16.1.10.10"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      },
      {
        "db": "BID",
        "id": "46937"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001670"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-026"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-1564"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:realflex:realwin",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001670"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Luigi Auriemma",
    "sources": [
      {
        "db": "BID",
        "id": "46937"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2011-1564",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2011-1564",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2011-1564",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2011-1564",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201104-026",
            "trust": 0.6,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001670"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-026"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-1564"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple integer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via crafted (1) On_FC_MISC_FCS_MSGBROADCAST and (2) On_FC_MISC_FCS_MSGSEND packets, which trigger a heap-based buffer overflow. DATAC RealWin is a SCADA server product that operates a single PC or multiple PCs over a TCP/IP network. DATAC RealWin SCADA Server can exploit vulnerabilities for buffer overflow attacks due to incorrect validation of user-supplied input. Successful exploitation of a vulnerability can execute arbitrary code in an application security context. DATAC RealWin is prone to multiple remote buffer-overflow vulnerabilities because of a failure to properly bounds check user-supplied input. Failed exploit attempts will cause a  denial-of-service condition. \nDATAC RealWin versions 2.1 and prior are vulnerable; other versions may also be affected. ----------------------------------------------------------------------\n\n\nMeet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March). \n\nhttp://secunia.com/company/events/mms_2011/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nRealWin FlexWin Connection Packet Processing Buffer Overflow\nVulnerabilities\n\nSECUNIA ADVISORY ID:\nSA43848\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/43848/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43848\n\nRELEASE DATE:\n2011-03-22\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/43848/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/43848/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43848\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nLuigi Auriemma has discovered multiple vulnerabilities in RealWin,\nwhich can be exploited by malicious people to compromise a vulnerable\nsystem. \n\nThe vulnerabilities are confirmed in version 2.1 Build 6.1.10.10. \n\nSOLUTION:\nRestrict access to trusted hosts only (e.g. via network access\ncontrol lists). \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/realwin_2-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_3-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_4-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_5-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_6-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_7-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_8-adv.txt\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-1564"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001670"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      },
      {
        "db": "BID",
        "id": "46937"
      },
      {
        "db": "PACKETSTORM",
        "id": "99614"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "46937",
        "trust": 3.3
      },
      {
        "db": "NVD",
        "id": "CVE-2011-1564",
        "trust": 2.7
      },
      {
        "db": "SECUNIA",
        "id": "43848",
        "trust": 2.5
      },
      {
        "db": "ICS CERT ALERT",
        "id": "ICS-ALERT-11-080-04",
        "trust": 2.4
      },
      {
        "db": "VUPEN",
        "id": "ADV-2011-0742",
        "trust": 1.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "17025",
        "trust": 1.6
      },
      {
        "db": "SREASON",
        "id": "8177",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001670",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "HTTP://WWW.US-CERT.GOV/CONTROL_SYSTEMS/PDF/ICS-ALERT-11-080-04.PDF",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-026",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "99614",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      },
      {
        "db": "BID",
        "id": "46937"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001670"
      },
      {
        "db": "PACKETSTORM",
        "id": "99614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-026"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-1564"
      }
    ]
  },
  "id": "VAR-201104-0288",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      }
    ],
    "trust": 1.1616071350000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:42:51.915000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Alert Update: RealWin vulnerability resolved",
        "trust": 0.8,
        "url": "http://realflex.com/news/alert-update-realwin-vulnerability-resolved"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001670"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-189",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001670"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-1564"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-11-080-04.pdf"
      },
      {
        "trust": 2.4,
        "url": "http://secunia.com/advisories/43848"
      },
      {
        "trust": 2.4,
        "url": "http://www.securityfocus.com/bid/46937"
      },
      {
        "trust": 1.9,
        "url": "http://aluigi.org/adv/realwin_6-adv.txt"
      },
      {
        "trust": 1.6,
        "url": "http://www.vupen.com/english/advisories/2011/0742"
      },
      {
        "trust": 1.6,
        "url": "http://www.exploit-db.com/exploits/17025"
      },
      {
        "trust": 1.0,
        "url": "http://securityreason.com/securityalert/8177"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1564"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1564"
      },
      {
        "trust": 0.6,
        "url": "http://aluigi.org/adv/realwin_1-adv.txthttp"
      },
      {
        "trust": 0.3,
        "url": "http://aluigi.org/adv/realwin_2-adv.txt"
      },
      {
        "trust": 0.3,
        "url": "http://aluigi.org/adv/realwin_3-adv.txt"
      },
      {
        "trust": 0.3,
        "url": "http://aluigi.org/adv/realwin_4-adv.txt"
      },
      {
        "trust": 0.3,
        "url": "http://aluigi.org/adv/realwin_5-adv.txt"
      },
      {
        "trust": 0.3,
        "url": "http://aluigi.org/adv/realwin_7-adv.txt"
      },
      {
        "trust": 0.3,
        "url": "http://aluigi.org/adv/realwin_8-adv.txt"
      },
      {
        "trust": 0.3,
        "url": "http://www.dataconline.com/software/realwin.php"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/517080"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/realwin_8-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/evm/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/company/events/mms_2011/"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/realwin_2-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/43848/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/realwin_5-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/realwin_3-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/realwin_6-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/realwin_4-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/43848/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/realwin_7-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43848"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      },
      {
        "db": "BID",
        "id": "46937"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001670"
      },
      {
        "db": "PACKETSTORM",
        "id": "99614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-026"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-1564"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      },
      {
        "db": "BID",
        "id": "46937"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001670"
      },
      {
        "db": "PACKETSTORM",
        "id": "99614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-026"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-1564"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-03-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      },
      {
        "date": "2011-03-21T00:00:00",
        "db": "BID",
        "id": "46937"
      },
      {
        "date": "2011-06-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-001670"
      },
      {
        "date": "2011-03-22T02:52:36",
        "db": "PACKETSTORM",
        "id": "99614"
      },
      {
        "date": "2011-04-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201104-026"
      },
      {
        "date": "2011-04-05T15:19:35.963000",
        "db": "NVD",
        "id": "CVE-2011-1564"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-03-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-1159"
      },
      {
        "date": "2015-04-13T21:01:00",
        "db": "BID",
        "id": "46937"
      },
      {
        "date": "2011-06-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-001670"
      },
      {
        "date": "2011-07-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201104-026"
      },
      {
        "date": "2024-11-21T01:26:36.597000",
        "db": "NVD",
        "id": "CVE-2011-1564"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-026"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "DATAC RealFlex RealWin of  HMI Application integer overflow vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001670"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "digital error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201104-026"
      }
    ],
    "trust": 0.6
  }
}

var-201011-0106
Vulnerability from variot

Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests. RealFlex RealWin HMI service (912/tcp) Contains multiple stack buffer overflow vulnerabilities. RealFlex RealWin HMI service (912/tcp) Contains two stack buffer overflow vulnerabilities. The first one is, SCPC_INITIALIZE() and SCPC_INITIALIZE_RF() In the function sprintf() Use, the second is SCPC_TXTEVENT() In the function strcpy() Due to the use of each.RealFlex RealWin HMI Service disruption by a third party with access to the service (DoS) An attacker may be attacked or execute arbitrary code. RealWin is a data acquisition and monitoring control system (SCADA) server product running on the Windows platform. - A boundary error occurred while processing the \"SCPC_INITIALIZE\" and \"SCPC_INITIALIZE_RF\" messages. Sending a specially constructed message to the TCP 912 port triggered a stack-based buffer overflow. - Handling \"SCPC_TXTEVENT\" messages with boundary errors, sending specially constructed messages to the TCP 912 port can trigger a stack-based buffer overflow. Failed exploit attempts will cause a denial-of-service condition. DATAC RealWin versions 2.0 and prior are vulnerable; other versions may also be affected. ----------------------------------------------------------------------

Windows Applications Insecure Library Loading

The Official, Verified Secunia List: http://secunia.com/advisories/windows_insecure_library_loading/

The list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected.


TITLE: RealWin Packet Processing Buffer Overflow Vulnerabilities

SECUNIA ADVISORY ID: SA41849

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/41849/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=41849

RELEASE DATE: 2010-10-18

DISCUSS ADVISORY: http://secunia.com/advisories/41849/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/41849/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=41849

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: Luigi Auriemma has discovered two vulnerabilities in RealWin, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

The vulnerabilities are confirmed in RealWin 2.1 Build 6.1.8.10.

SOLUTION: Restrict network access to trusted users only.

PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma

ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/realwin_1-adv.txt

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201011-0106",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "realwin",
        "scope": "eq",
        "trust": 2.2,
        "vendor": "realflex",
        "version": "1.06"
      },
      {
        "model": "realwin",
        "scope": "eq",
        "trust": 2.2,
        "vendor": "realflex",
        "version": "2.0"
      },
      {
        "model": "realwin build",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": "2.16.1.8.10"
      },
      {
        "model": "control international realwin scada server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "datac",
        "version": "1.06"
      },
      {
        "model": "control international realwin scada server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "datac",
        "version": "2.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.8,
        "vendor": "realwin",
        "version": "1.06"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.8,
        "vendor": "realwin",
        "version": "2.0"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "realflex",
        "version": null
      },
      {
        "model": "realwin",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "realflex",
        "version": "2.1.10 (2.1 build 6.1.10.10) earlier"
      },
      {
        "model": "control international realwin scada server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "datac",
        "version": "2.1.10"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d79344f-463f-11e9-a630-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d775f90-463f-11e9-bc81-000c29342cb1"
      },
      {
        "db": "CERT/CC",
        "id": "VU#222657"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2367"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2654"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2643"
      },
      {
        "db": "BID",
        "id": "44150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002532"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201011-011"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4142"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:realflex:realwin",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002532"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Luigi Auriemma",
    "sources": [
      {
        "db": "BID",
        "id": "44150"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201011-011"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2010-4142",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2010-4142",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2010-4142",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:P/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": null,
            "accessVector": null,
            "authentication": null,
            "author": "IVD",
            "availabilityImpact": null,
            "baseScore": null,
            "confidentialityImpact": null,
            "exploitabilityScore": null,
            "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d",
            "impactScore": null,
            "integrityImpact": null,
            "severity": null,
            "trust": 0.2,
            "vectorString": null,
            "version": "unknown"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "7d79344f-463f-11e9-a630-000c29342cb1",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "7d775f90-463f-11e9-bc81-000c29342cb1",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2010-4142",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#222657",
            "trust": 0.8,
            "value": "12.07"
          },
          {
            "author": "NVD",
            "id": "CVE-2010-4142",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201011-011",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "7d79344f-463f-11e9-a630-000c29342cb1",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "7d775f90-463f-11e9-bc81-000c29342cb1",
            "trust": 0.2,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d79344f-463f-11e9-a630-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d775f90-463f-11e9-bc81-000c29342cb1"
      },
      {
        "db": "CERT/CC",
        "id": "VU#222657"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002532"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201011-011"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4142"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests. RealFlex RealWin HMI service (912/tcp) Contains multiple stack buffer overflow vulnerabilities. RealFlex RealWin HMI service (912/tcp) Contains two stack buffer overflow vulnerabilities. The first one is, SCPC_INITIALIZE() and SCPC_INITIALIZE_RF() In the function sprintf() Use, the second is SCPC_TXTEVENT() In the function strcpy() Due to the use of each.RealFlex RealWin HMI Service disruption by a third party with access to the service (DoS) An attacker may be attacked or execute arbitrary code. RealWin is a data acquisition and monitoring control system (SCADA) server product running on the Windows platform. - A boundary error occurred while processing the \\\"SCPC_INITIALIZE\\\" and \\\"SCPC_INITIALIZE_RF\\\" messages. Sending a specially constructed message to the TCP 912 port triggered a stack-based buffer overflow. - Handling \\\"SCPC_TXTEVENT\\\" messages with boundary errors, sending specially constructed messages to the TCP 912 port can trigger a stack-based buffer overflow. Failed exploit attempts will cause a  denial-of-service condition. \nDATAC RealWin versions 2.0 and prior are vulnerable; other versions may also be affected. ----------------------------------------------------------------------\n\n\nWindows Applications Insecure Library Loading\n\nThe Official, Verified Secunia List:\nhttp://secunia.com/advisories/windows_insecure_library_loading/\n\nThe list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected. \n\n\n----------------------------------------------------------------------\n\nTITLE:\nRealWin Packet Processing Buffer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA41849\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/41849/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41849\n\nRELEASE DATE:\n2010-10-18\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/41849/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/41849/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41849\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nLuigi Auriemma has discovered two vulnerabilities in RealWin, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService) and potentially compromise a vulnerable system. \n\nThe vulnerabilities are confirmed in RealWin 2.1 Build 6.1.8.10. \n\nSOLUTION:\nRestrict network access to trusted users only. \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/realwin_1-adv.txt\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-4142"
      },
      {
        "db": "CERT/CC",
        "id": "VU#222657"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002532"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2367"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2654"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2643"
      },
      {
        "db": "BID",
        "id": "44150"
      },
      {
        "db": "IVD",
        "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d79344f-463f-11e9-a630-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d775f90-463f-11e9-bc81-000c29342cb1"
      },
      {
        "db": "PACKETSTORM",
        "id": "94927"
      }
    ],
    "trust": 5.4
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2010-4142",
        "trust": 4.7
      },
      {
        "db": "SECUNIA",
        "id": "41849",
        "trust": 4.3
      },
      {
        "db": "BID",
        "id": "44150",
        "trust": 2.7
      },
      {
        "db": "EXPLOIT-DB",
        "id": "15337",
        "trust": 2.4
      },
      {
        "db": "CERT/CC",
        "id": "VU#222657",
        "trust": 1.9
      },
      {
        "db": "EXPLOIT-DB",
        "id": "15259",
        "trust": 1.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201011-011",
        "trust": 1.4
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2643",
        "trust": 1.0
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2367",
        "trust": 1.0
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2654",
        "trust": 1.0
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-10-313-01",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002532",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "5BDDCCE8-1FAA-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "7D7EB28F-463F-11E9-90C2-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "354CDFC2-1FAC-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "7D79344F-463F-11E9-A630-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "B50A7FF6-2355-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "7D775F90-463F-11E9-BC81-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "94927",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d79344f-463f-11e9-a630-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d775f90-463f-11e9-bc81-000c29342cb1"
      },
      {
        "db": "CERT/CC",
        "id": "VU#222657"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2367"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2654"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2643"
      },
      {
        "db": "BID",
        "id": "44150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002532"
      },
      {
        "db": "PACKETSTORM",
        "id": "94927"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201011-011"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4142"
      }
    ]
  },
  "id": "VAR-201011-0106",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d79344f-463f-11e9-a630-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d775f90-463f-11e9-bc81-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2367"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2654"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2643"
      }
    ],
    "trust": 3.70773809
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 3.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d79344f-463f-11e9-a630-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d775f90-463f-11e9-bc81-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2367"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2654"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2643"
      }
    ]
  },
  "last_update_date": "2024-11-23T23:10:06.264000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "RealFlex Online Support System (\u767b\u9332\u30e6\u30fc\u30b6\u306e\u307f)",
        "trust": 0.8,
        "url": "http://cs.realflex.com/cs/index.ssp"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.realflex.com"
      },
      {
        "title": "Patch for DATAC RealWin Stack Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/1586"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-2643"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002532"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002532"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4142"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.6,
        "url": "http://secunia.com/advisories/41849"
      },
      {
        "trust": 2.4,
        "url": "http://www.securityfocus.com/bid/44150"
      },
      {
        "trust": 1.6,
        "url": "http://www.exploit-db.com/exploits/15337"
      },
      {
        "trust": 1.6,
        "url": "http://www.exploit-db.com/exploits/15259"
      },
      {
        "trust": 1.6,
        "url": "http://aluigi.org/adv/realwin_1-adv.txt"
      },
      {
        "trust": 1.2,
        "url": "http://aluigi.altervista.org/adv/realwin_1-adv.txt"
      },
      {
        "trust": 1.1,
        "url": "http://www.kb.cert.org/vuls/id/222657"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-10-313-01.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://www.exploit-db.com/exploits/15337/"
      },
      {
        "trust": 0.8,
        "url": "http://www.realflex.com/products/realwin/realwin.php"
      },
      {
        "trust": 0.8,
        "url": "http://cs.realflex.com/cs/index.ssp"
      },
      {
        "trust": 0.8,
        "url": "https://www.metasploit.com/redmine/projects/framework/repository/revisions/11067/entry/modules/exploits/windows/scada/realwin_10.rb"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4142"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu222657"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4142"
      },
      {
        "trust": 0.7,
        "url": "http://secunia.com/advisories/41849/"
      },
      {
        "trust": 0.3,
        "url": "http://www.realflex.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.dataconline.com/software/realwin.php"
      },
      {
        "trust": 0.3,
        "url": "http://www.realflex.com"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/evm/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/41849/#comments"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41849"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/windows_insecure_library_loading/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#222657"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2367"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2654"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2643"
      },
      {
        "db": "BID",
        "id": "44150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002532"
      },
      {
        "db": "PACKETSTORM",
        "id": "94927"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201011-011"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4142"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d79344f-463f-11e9-a630-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d775f90-463f-11e9-bc81-000c29342cb1"
      },
      {
        "db": "CERT/CC",
        "id": "VU#222657"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2367"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2654"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2643"
      },
      {
        "db": "BID",
        "id": "44150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002532"
      },
      {
        "db": "PACKETSTORM",
        "id": "94927"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201011-011"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4142"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-11-03T00:00:00",
        "db": "IVD",
        "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2010-10-19T00:00:00",
        "db": "IVD",
        "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1"
      },
      {
        "date": "2010-10-19T00:00:00",
        "db": "IVD",
        "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2010-11-04T00:00:00",
        "db": "IVD",
        "id": "7d79344f-463f-11e9-a630-000c29342cb1"
      },
      {
        "date": "2010-11-04T00:00:00",
        "db": "IVD",
        "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2010-11-03T00:00:00",
        "db": "IVD",
        "id": "7d775f90-463f-11e9-bc81-000c29342cb1"
      },
      {
        "date": "2010-11-19T00:00:00",
        "db": "CERT/CC",
        "id": "VU#222657"
      },
      {
        "date": "2010-10-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2010-2367"
      },
      {
        "date": "2010-11-04T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2010-2654"
      },
      {
        "date": "2010-11-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2010-2643"
      },
      {
        "date": "2010-10-15T00:00:00",
        "db": "BID",
        "id": "44150"
      },
      {
        "date": "2010-12-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-002532"
      },
      {
        "date": "2010-10-18T03:06:45",
        "db": "PACKETSTORM",
        "id": "94927"
      },
      {
        "date": "2010-11-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201011-011"
      },
      {
        "date": "2010-11-02T02:26:36.693000",
        "db": "NVD",
        "id": "CVE-2010-4142"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-11-23T00:00:00",
        "db": "CERT/CC",
        "id": "VU#222657"
      },
      {
        "date": "2010-10-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2010-2367"
      },
      {
        "date": "2010-11-04T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2010-2654"
      },
      {
        "date": "2010-11-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2010-2643"
      },
      {
        "date": "2010-11-19T18:26:00",
        "db": "BID",
        "id": "44150"
      },
      {
        "date": "2010-12-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-002532"
      },
      {
        "date": "2010-11-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201011-011"
      },
      {
        "date": "2024-11-21T01:20:17.743000",
        "db": "NVD",
        "id": "CVE-2010-4142"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201011-011"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "DATAC RealWin Multiple Stack Buffer Overflow Vulnerabilities",
    "sources": [
      {
        "db": "IVD",
        "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d775f90-463f-11e9-bc81-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-2643"
      }
    ],
    "trust": 1.0
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d79344f-463f-11e9-a630-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d775f90-463f-11e9-bc81-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201011-011"
      }
    ],
    "trust": 1.8
  }
}

var-201209-0244
Vulnerability from variot

Multiple untrusted search path vulnerabilities in RealFlex RealWin before 2.1.13, FlexView before 3.1.86, and RealWinDemo before 2.1.13 allow local users to gain privileges via a Trojan horse (1) realwin.dll or (2) keyhook.dll file in the current working directory. plural RealFlex There is a vulnerability in the product that can be obtained because the processing related to the search path is incomplete. Supplementary information : CWE Vulnerability type by CWE-426: Untrusted Search Path ( Unreliable search path ) Has been identified. (1) realwin.dll Or (2) keyhook.dll It may be possible to get permission through the file. RealWin is a data acquisition and monitoring control system (SCADA) server product running on the Windows platform. FlexView is a human interface product for Eston Automation. Multiple RealFlex products are not installed in the library file, and an attacker can build a malicious DLL file, store it in a remote WebDAV or SMB share, entice the application to parse, and execute arbitrary code in the application context. Multiple RealFlex products are prone to an insecure library loading vulnerability

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201209-0244",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "realwin",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "realflex",
        "version": "1.06"
      },
      {
        "model": "realwin",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "realflex",
        "version": "2.1"
      },
      {
        "model": "realwin",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "realflex",
        "version": "2.0"
      },
      {
        "model": "realwin",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "realflex",
        "version": "2.1.12"
      },
      {
        "model": "flexview",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "realflex",
        "version": "3.1.85"
      },
      {
        "model": "realwindemo",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "realflex",
        "version": "2.1.12"
      },
      {
        "model": "flexview",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "realflex",
        "version": "3.1.86"
      },
      {
        "model": "realwin",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "realflex",
        "version": "2.1.13"
      },
      {
        "model": "realwindemo",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "realflex",
        "version": "2.1.13"
      },
      {
        "model": "realwindemo",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "realflex",
        "version": "\u003c=2.1.12"
      },
      {
        "model": "realwin",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "realflex",
        "version": "\u003c=2.1.12"
      },
      {
        "model": "flexview",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "realflex",
        "version": "\u003c=3.1.85"
      },
      {
        "model": "realwindemo",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "realflex",
        "version": "2.1.12"
      },
      {
        "model": "realwin",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "realflex",
        "version": "2.1.12"
      },
      {
        "model": "flexview",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "realflex",
        "version": "3.1.85"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "realwin",
        "version": "1.06"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "realwin",
        "version": "2.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "realwin",
        "version": "2.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "realwin",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "flexview",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "realwindemo",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "63c9cf40-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-5010"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004246"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-148"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3004"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:realflex:flexview",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:realflex:realwin",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:realflex:realwindemo",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004246"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Carlos Mario Penagos Hollmann",
    "sources": [
      {
        "db": "BID",
        "id": "55464"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-3004",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "CVE-2012-3004",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "63c9cf40-2353-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-3004",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-3004",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201209-148",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "63c9cf40-2353-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "63c9cf40-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004246"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-148"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3004"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple untrusted search path vulnerabilities in RealFlex RealWin before 2.1.13, FlexView before 3.1.86, and RealWinDemo before 2.1.13 allow local users to gain privileges via a Trojan horse (1) realwin.dll or (2) keyhook.dll file in the current working directory. plural RealFlex There is a vulnerability in the product that can be obtained because the processing related to the search path is incomplete. Supplementary information : CWE Vulnerability type by CWE-426: Untrusted Search Path ( Unreliable search path ) Has been identified. (1) realwin.dll Or (2) keyhook.dll It may be possible to get permission through the file. RealWin is a data acquisition and monitoring control system (SCADA) server product running on the Windows platform. FlexView is a human interface product for Eston Automation. Multiple RealFlex products are not installed in the library file, and an attacker can build a malicious DLL file, store it in a remote WebDAV or SMB share, entice the application to parse, and execute arbitrary code in the application context. Multiple RealFlex products are prone to an insecure library loading vulnerability",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-3004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004246"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-5010"
      },
      {
        "db": "BID",
        "id": "55464"
      },
      {
        "db": "IVD",
        "id": "63c9cf40-2353-11e6-abef-000c29c66e3d"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-3004",
        "trust": 3.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-12-251-01",
        "trust": 3.3
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-5010",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-148",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004246",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "55464",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "63C9CF40-2353-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "63c9cf40-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-5010"
      },
      {
        "db": "BID",
        "id": "55464"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004246"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-148"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3004"
      }
    ]
  },
  "id": "VAR-201209-0244",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "63c9cf40-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-5010"
      }
    ],
    "trust": 1.2319444400000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "63c9cf40-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-5010"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:59:49.190000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.realflex.com/"
      },
      {
        "title": "Multiple RealFlex product insecure libraries load patches for arbitrary code execution vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/21891"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-5010"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004246"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004246"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3004"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-251-01.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3004"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3004"
      },
      {
        "trust": 0.3,
        "url": "http://realflex.com/products/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-5010"
      },
      {
        "db": "BID",
        "id": "55464"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004246"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-148"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3004"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "63c9cf40-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-5010"
      },
      {
        "db": "BID",
        "id": "55464"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004246"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-148"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3004"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-09-11T00:00:00",
        "db": "IVD",
        "id": "63c9cf40-2353-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2012-09-11T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-5010"
      },
      {
        "date": "2012-09-07T00:00:00",
        "db": "BID",
        "id": "55464"
      },
      {
        "date": "2012-09-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-004246"
      },
      {
        "date": "2012-09-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201209-148"
      },
      {
        "date": "2012-09-08T10:28:20.510000",
        "db": "NVD",
        "id": "CVE-2012-3004"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-09-11T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-5010"
      },
      {
        "date": "2012-09-07T00:00:00",
        "db": "BID",
        "id": "55464"
      },
      {
        "date": "2012-09-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-004246"
      },
      {
        "date": "2012-09-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201209-148"
      },
      {
        "date": "2024-11-21T01:40:06.297000",
        "db": "NVD",
        "id": "CVE-2012-3004"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "55464"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-148"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  RealFlex Vulnerability gained in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004246"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "IVD",
        "id": "63c9cf40-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-148"
      }
    ],
    "trust": 0.8
  }
}

Vulnerability from fkie_nvd
Published
2011-04-05 15:19
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified "On_FC_BINFILE_FCS_*FILE", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910.
References
cve@mitre.orghttp://aluigi.org/adv/realwin_2-adv.txtExploit
cve@mitre.orghttp://aluigi.org/adv/realwin_3-adv.txtExploit
cve@mitre.orghttp://aluigi.org/adv/realwin_4-adv.txtExploit
cve@mitre.orghttp://aluigi.org/adv/realwin_5-adv.txtExploit
cve@mitre.orghttp://aluigi.org/adv/realwin_7-adv.txtExploit
cve@mitre.orghttp://aluigi.org/adv/realwin_8-adv.txtExploit
cve@mitre.orghttp://secunia.com/advisories/43848Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/8176
cve@mitre.orghttp://www.exploit-db.com/exploits/17025Exploit
cve@mitre.orghttp://www.securityfocus.com/bid/46937
cve@mitre.orghttp://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdfUS Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0742Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://aluigi.org/adv/realwin_2-adv.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://aluigi.org/adv/realwin_3-adv.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://aluigi.org/adv/realwin_4-adv.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://aluigi.org/adv/realwin_5-adv.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://aluigi.org/adv/realwin_7-adv.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://aluigi.org/adv/realwin_8-adv.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43848Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/8176
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/17025Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/46937
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdfUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0742Vendor Advisory
Impacted products
Vendor Product Version
realflex realwin *
realflex realwin 1.06
realflex realwin 2.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:realflex:realwin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1A6062A-E8AA-4653-99DD-EC1A9420422F",
              "versionEndIncluding": "2.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realflex:realwin:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C400FAA-C8A3-4549-9954-91F19C7BE50F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realflex:realwin:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE107083-8D98-419D-9EEC-8E8067E12201",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified \"On_FC_BINFILE_FCS_*FILE\", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer basado en pila en la aplicaci\u00f3n HMI en Datac RealFlex RealWin v2.1 (Build 6.1.10.10) y anteriores permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un nombre de usuario largo en un paquete (1) On_FC_CONNECT_FCS_LOGIN, y paquetes manipulados hacia el puerto 910 (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified \"On_FC_BINFILE_FCS_*FILE\", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, y (11) On_FC_SCRIPT_FCS_STARTPROG"
    }
  ],
  "id": "CVE-2011-1563",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-05T15:19:35.930",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_2-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_3-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_4-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_5-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_7-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_8-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43848"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/8176"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/17025"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/46937"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_2-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_3-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_4-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_5-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_7-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_8-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43848"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/8176"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/17025"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0742"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-04-05 15:19
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple integer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via crafted (1) On_FC_MISC_FCS_MSGBROADCAST and (2) On_FC_MISC_FCS_MSGSEND packets, which trigger a heap-based buffer overflow.
Impacted products
Vendor Product Version
realflex realwin *
realflex realwin 1.06
realflex realwin 2.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:realflex:realwin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1A6062A-E8AA-4653-99DD-EC1A9420422F",
              "versionEndIncluding": "2.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realflex:realwin:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C400FAA-C8A3-4549-9954-91F19C7BE50F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realflex:realwin:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE107083-8D98-419D-9EEC-8E8067E12201",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple integer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via crafted (1) On_FC_MISC_FCS_MSGBROADCAST and (2) On_FC_MISC_FCS_MSGSEND packets, which trigger a heap-based buffer overflow."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de entero en la aplicaci\u00f3n HMI en Datac RealFlex RealWin v2.1 (Build 6.1.10.10) y anteriores permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de paquetes manipulados  (1) On_FC_MISC_FCS_MSGBROADCAST y (2) On_FC_MISC_FCS_MSGSEND, que provocan un desbordamiento de b\u00fafer basado en memoria din\u00e1mica"
    }
  ],
  "id": "CVE-2011-1564",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-04-05T15:19:35.963",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_6-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43848"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/8177"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/17025"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/46937"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_6-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43848"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/8177"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/17025"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/46937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0742"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-09-08 10:28
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple untrusted search path vulnerabilities in RealFlex RealWin before 2.1.13, FlexView before 3.1.86, and RealWinDemo before 2.1.13 allow local users to gain privileges via a Trojan horse (1) realwin.dll or (2) keyhook.dll file in the current working directory.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:realflex:realwin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "623061FC-5D07-4B73-84D2-7BBAF539F046",
              "versionEndIncluding": "2.1.12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realflex:realwin:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C400FAA-C8A3-4549-9954-91F19C7BE50F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realflex:realwin:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE107083-8D98-419D-9EEC-8E8067E12201",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realflex:realwin:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D51FC22-F25C-4F47-9B38-F9E6CF57E361",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:realflex:flexview:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "695A3D6C-9E33-4FBB-84BD-9B24101C264B",
              "versionEndIncluding": "3.1.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:realflex:realwindemo:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "69276A4F-33C4-4A95-980D-939577FE0CCD",
              "versionEndIncluding": "2.1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple untrusted search path vulnerabilities in RealFlex RealWin before 2.1.13, FlexView before 3.1.86, and RealWinDemo before 2.1.13 allow local users to gain privileges via a Trojan horse (1) realwin.dll or (2) keyhook.dll file in the current working directory."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de ruta de b\u00fasqueda no confiable en RealFlex RealWin antes de v2.1.13, FlexView antes de v3.1.86, y RealWinDemo antes de v2.1.13, permite a usuarios locales obtener privilegios a trav\u00e9s de un troyano (1) realwin.dll o (2) KeyHook.dll en el directorio de trabajo actual."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n\u0027CWE-426 Untrusted Search Path\u0027",
  "id": "CVE-2012-3004",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-08T10:28:20.510",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-11-02 02:26
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests.
Impacted products
Vendor Product Version
realflex realwin 1.06
realflex realwin 2.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:realflex:realwin:1.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C400FAA-C8A3-4549-9954-91F19C7BE50F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:realflex:realwin:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE107083-8D98-419D-9EEC-8E8067E12201",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests."
    },
    {
      "lang": "es",
      "value": "M\u00daltiples desbordamientos de buffer basados en pila en DATAC RealWin 2.0 Build 6.1.8.10 y versiones anteriores. Permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un paquete (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF o (3) SCPC_TXTEVENT. NOTA: posteriormente se report\u00f3 que la versi\u00f3n 1.06 tambi\u00e9n se ve afectada por una de estas peticiones."
    }
  ],
  "evaluatorComment": "http://www.vupen.com/english/advisories/2010/2714",
  "id": "CVE-2010-4142",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-11-02T02:26:36.693",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_1-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41849"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/15259"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/15337"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/44150"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/adv/realwin_1-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41849"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/15259"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/15337"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/44150"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2011-1564 (GCVE-0-2011-1564)
Vulnerability from cvelistv5
Published
2011-04-05 15:00
Modified
2024-08-06 22:28
Severity ?
CWE
  • n/a
Summary
Multiple integer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via crafted (1) On_FC_MISC_FCS_MSGBROADCAST and (2) On_FC_MISC_FCS_MSGSEND packets, which trigger a heap-based buffer overflow.
References
http://www.securityfocus.com/bid/46937vdb-entry, x_refsource_BID
http://securityreason.com/securityalert/8177third-party-advisory, x_refsource_SREASON
http://aluigi.org/adv/realwin_6-adv.txtx_refsource_MISC
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdfx_refsource_MISC
http://www.exploit-db.com/exploits/17025exploit, x_refsource_EXPLOIT-DB
http://secunia.com/advisories/43848third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0742vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:41.935Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "46937",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46937"
          },
          {
            "name": "8177",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8177"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.org/adv/realwin_6-adv.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf"
          },
          {
            "name": "17025",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/17025"
          },
          {
            "name": "43848",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43848"
          },
          {
            "name": "ADV-2011-0742",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0742"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple integer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via crafted (1) On_FC_MISC_FCS_MSGBROADCAST and (2) On_FC_MISC_FCS_MSGSEND packets, which trigger a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-22T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "46937",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46937"
        },
        {
          "name": "8177",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8177"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.org/adv/realwin_6-adv.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf"
        },
        {
          "name": "17025",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/17025"
        },
        {
          "name": "43848",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43848"
        },
        {
          "name": "ADV-2011-0742",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0742"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1564",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple integer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via crafted (1) On_FC_MISC_FCS_MSGBROADCAST and (2) On_FC_MISC_FCS_MSGSEND packets, which trigger a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "46937",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46937"
            },
            {
              "name": "8177",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/8177"
            },
            {
              "name": "http://aluigi.org/adv/realwin_6-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.org/adv/realwin_6-adv.txt"
            },
            {
              "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf",
              "refsource": "MISC",
              "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf"
            },
            {
              "name": "17025",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/17025"
            },
            {
              "name": "43848",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43848"
            },
            {
              "name": "ADV-2011-0742",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0742"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1564",
    "datePublished": "2011-04-05T15:00:00",
    "dateReserved": "2011-04-05T00:00:00",
    "dateUpdated": "2024-08-06T22:28:41.935Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-3004 (GCVE-0-2012-3004)
Vulnerability from cvelistv5
Published
2012-09-08 10:00
Modified
2024-09-17 03:23
Severity ?
CWE
  • n/a
Summary
Multiple untrusted search path vulnerabilities in RealFlex RealWin before 2.1.13, FlexView before 3.1.86, and RealWinDemo before 2.1.13 allow local users to gain privileges via a Trojan horse (1) realwin.dll or (2) keyhook.dll file in the current working directory.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.345Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple untrusted search path vulnerabilities in RealFlex RealWin before 2.1.13, FlexView before 3.1.86, and RealWinDemo before 2.1.13 allow local users to gain privileges via a Trojan horse (1) realwin.dll or (2) keyhook.dll file in the current working directory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-09-08T10:00:00Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2012-3004",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple untrusted search path vulnerabilities in RealFlex RealWin before 2.1.13, FlexView before 3.1.86, and RealWinDemo before 2.1.13 allow local users to gain privileges via a Trojan horse (1) realwin.dll or (2) keyhook.dll file in the current working directory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf",
              "refsource": "MISC",
              "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2012-3004",
    "datePublished": "2012-09-08T10:00:00Z",
    "dateReserved": "2012-05-30T00:00:00Z",
    "dateUpdated": "2024-09-17T03:23:37.476Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1563 (GCVE-0-2011-1563)
Vulnerability from cvelistv5
Published
2011-04-05 15:00
Modified
2024-08-06 22:28
Severity ?
CWE
  • n/a
Summary
Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified "On_FC_BINFILE_FCS_*FILE", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:41.817Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "46937",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46937"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.org/adv/realwin_2-adv.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.org/adv/realwin_7-adv.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf"
          },
          {
            "name": "17025",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/17025"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.org/adv/realwin_4-adv.txt"
          },
          {
            "name": "43848",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43848"
          },
          {
            "name": "ADV-2011-0742",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0742"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.org/adv/realwin_8-adv.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.org/adv/realwin_5-adv.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.org/adv/realwin_3-adv.txt"
          },
          {
            "name": "8176",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8176"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified \"On_FC_BINFILE_FCS_*FILE\", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-22T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "46937",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46937"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.org/adv/realwin_2-adv.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.org/adv/realwin_7-adv.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf"
        },
        {
          "name": "17025",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/17025"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.org/adv/realwin_4-adv.txt"
        },
        {
          "name": "43848",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43848"
        },
        {
          "name": "ADV-2011-0742",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0742"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.org/adv/realwin_8-adv.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.org/adv/realwin_5-adv.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.org/adv/realwin_3-adv.txt"
        },
        {
          "name": "8176",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8176"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1563",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified \"On_FC_BINFILE_FCS_*FILE\", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "46937",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46937"
            },
            {
              "name": "http://aluigi.org/adv/realwin_2-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.org/adv/realwin_2-adv.txt"
            },
            {
              "name": "http://aluigi.org/adv/realwin_7-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.org/adv/realwin_7-adv.txt"
            },
            {
              "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf",
              "refsource": "MISC",
              "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf"
            },
            {
              "name": "17025",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/17025"
            },
            {
              "name": "http://aluigi.org/adv/realwin_4-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.org/adv/realwin_4-adv.txt"
            },
            {
              "name": "43848",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43848"
            },
            {
              "name": "ADV-2011-0742",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0742"
            },
            {
              "name": "http://aluigi.org/adv/realwin_8-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.org/adv/realwin_8-adv.txt"
            },
            {
              "name": "http://aluigi.org/adv/realwin_5-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.org/adv/realwin_5-adv.txt"
            },
            {
              "name": "http://aluigi.org/adv/realwin_3-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.org/adv/realwin_3-adv.txt"
            },
            {
              "name": "8176",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/8176"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1563",
    "datePublished": "2011-04-05T15:00:00",
    "dateReserved": "2011-04-05T00:00:00",
    "dateUpdated": "2024-08-06T22:28:41.817Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-4142 (GCVE-0-2010-4142)
Vulnerability from cvelistv5
Published
2010-11-01 18:00
Modified
2024-09-16 22:08
Severity ?
CWE
  • n/a
Summary
Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests.
References
http://www.exploit-db.com/exploits/15259exploit, x_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/44150vdb-entry, x_refsource_BID
http://aluigi.org/adv/realwin_1-adv.txtx_refsource_MISC
http://www.exploit-db.com/exploits/15337exploit, x_refsource_EXPLOIT-DB
http://secunia.com/advisories/41849third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:34:37.420Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "15259",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/15259"
          },
          {
            "name": "44150",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/44150"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.org/adv/realwin_1-adv.txt"
          },
          {
            "name": "15337",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/15337"
          },
          {
            "name": "41849",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/41849"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-11-01T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "15259",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/15259"
        },
        {
          "name": "44150",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/44150"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.org/adv/realwin_1-adv.txt"
        },
        {
          "name": "15337",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/15337"
        },
        {
          "name": "41849",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/41849"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4142",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "15259",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/15259"
            },
            {
              "name": "44150",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/44150"
            },
            {
              "name": "http://aluigi.org/adv/realwin_1-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.org/adv/realwin_1-adv.txt"
            },
            {
              "name": "15337",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/15337"
            },
            {
              "name": "41849",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/41849"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4142",
    "datePublished": "2010-11-01T18:00:00Z",
    "dateReserved": "2010-11-01T00:00:00Z",
    "dateUpdated": "2024-09-16T22:08:27.666Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}