Vulnerabilites related to realflex - realwin
var-201104-0287
Vulnerability from variot
Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified "On_FC_BINFILE_FCS_FILE", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910. (2)On_FC_CTAGLIST_FCS_CADDTAG (3)On_FC_CTAGLIST_FCS_CDELTAG (4)On_FC_CTAGLIST_FCS_ADDTAGMS (5)On_FC_RFUSER_FCS_LOGIN (6)unspecified "On_FC_BINFILE_FCS_FILE (7)On_FC_CGETTAG_FCS_GETTELEMETRY (8)On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY (9)On_FC_CGETTAG_FCS_SETTELEMETRY (10)On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY (11)On_FC_SCRIPT_FCS_STARTPROG packets to port 910. DATAC RealWin is a SCADA server product that operates a single PC or multiple PCs over a TCP/IP network. DATAC RealWin SCADA Server can exploit vulnerabilities for buffer overflow attacks due to incorrect validation of user-supplied input. Successful exploitation of a vulnerability can execute arbitrary code in an application security context. DATAC RealWin is prone to multiple remote buffer-overflow vulnerabilities because of a failure to properly bounds check user-supplied input. Failed exploit attempts will cause a denial-of-service condition. DATAC RealWin versions 2.1 and prior are vulnerable; other versions may also be affected. ----------------------------------------------------------------------
Meet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March).
http://secunia.com/company/events/mms_2011/
TITLE: RealWin FlexWin Connection Packet Processing Buffer Overflow Vulnerabilities
SECUNIA ADVISORY ID: SA43848
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43848/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43848
RELEASE DATE: 2011-03-22
DISCUSS ADVISORY: http://secunia.com/advisories/43848/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/43848/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=43848
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Luigi Auriemma has discovered multiple vulnerabilities in RealWin, which can be exploited by malicious people to compromise a vulnerable system.
6) An input validation error when processing "On_FC_MISC_FCS_MSGBROADCAST" packets can be exploited to cause a heap-based buffer overflow via a specially crafted packet sent to TCP port 910.
7) An input validation error when processing "On_FC_MISC_FCS_MSGSEND" packets can be exploited to cause a heap-based buffer overflow via a specially crafted packet sent to TCP port 910.
The vulnerabilities are confirmed in version 2.1 Build 6.1.10.10.
SOLUTION: Restrict access to trusted hosts only (e.g. via network access control lists).
PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma
ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/realwin_2-adv.txt http://aluigi.altervista.org/adv/realwin_3-adv.txt http://aluigi.altervista.org/adv/realwin_4-adv.txt http://aluigi.altervista.org/adv/realwin_5-adv.txt http://aluigi.altervista.org/adv/realwin_6-adv.txt http://aluigi.altervista.org/adv/realwin_7-adv.txt http://aluigi.altervista.org/adv/realwin_8-adv.txt
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201104-0287", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "realwin", "scope": "eq", "trust": 1.6, "vendor": "realflex", "version": "2.0" }, { "model": "realwin", "scope": "eq", "trust": 1.6, "vendor": "realflex", "version": "1.06" }, { "model": "control international realwin scada server", "scope": "eq", "trust": 1.3, "vendor": "datac", "version": "2.1.10" }, { "model": "realwin", "scope": "lte", "trust": 1.0, "vendor": "realflex", "version": "2.1" }, { "model": "control international realwin scada server", "scope": "eq", "trust": 0.9, "vendor": "datac", "version": "1.06" }, { "model": "control international realwin scada server", "scope": "eq", "trust": 0.9, "vendor": "datac", "version": "2.0" }, { "model": "control international realwin scada server", "scope": "eq", "trust": 0.9, "vendor": "datac", "version": "2.1" }, { "model": "realwin", "scope": "lt", "trust": 0.8, "vendor": "realflex", "version": "2.1.12" }, { "model": "control international realwin scada server (build", "scope": "eq", "trust": 0.6, "vendor": "datac", "version": "2.16.1.10.10)" }, { "model": "realwin", "scope": "eq", "trust": 0.6, "vendor": "realflex", "version": "2.1" }, { "model": "control international realwin scada server (build", "scope": "eq", "trust": 0.4, "vendor": "datac", "version": "2.16.1.10.10)*" }, { "model": "control international realwin scada server", "scope": "eq", "trust": 0.4, "vendor": "datac", "version": "1.06*" }, { "model": "control international realwin scada server", "scope": "eq", "trust": 0.4, "vendor": "datac", "version": "2.0*" }, { "model": "control international realwin scada server", "scope": "eq", "trust": 0.4, "vendor": "datac", "version": "2.1*" }, { "model": "control international realwin scada server (build", "scope": "eq", "trust": 0.3, "vendor": "datac", "version": "2.16.1.10.10" } ], "sources": [ { "db": "IVD", "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1" }, { "db": "IVD", "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1159" }, { "db": "BID", "id": "46937" }, { "db": "JVNDB", "id": "JVNDB-2011-001669" }, { "db": "CNNVD", "id": "CNNVD-201104-025" }, { "db": "NVD", "id": "CVE-2011-1563" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:realflex:realwin", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001669" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma", "sources": [ { "db": "BID", "id": "46937" } ], "trust": 0.3 }, "cve": "CVE-2011-1563", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2011-1563", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-1563", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2011-1563", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201104-025", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1", "trust": 0.2, "value": "CRITICAL" }, { "author": "IVD", "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1" }, { "db": "IVD", "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d" }, { "db": "JVNDB", "id": "JVNDB-2011-001669" }, { "db": "CNNVD", "id": "CNNVD-201104-025" }, { "db": "NVD", "id": "CVE-2011-1563" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified \"On_FC_BINFILE_FCS_*FILE\", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910. (2)On_FC_CTAGLIST_FCS_CADDTAG (3)On_FC_CTAGLIST_FCS_CDELTAG (4)On_FC_CTAGLIST_FCS_ADDTAGMS (5)On_FC_RFUSER_FCS_LOGIN (6)unspecified \"On_FC_BINFILE_FCS_*FILE (7)On_FC_CGETTAG_FCS_GETTELEMETRY (8)On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY (9)On_FC_CGETTAG_FCS_SETTELEMETRY (10)On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY (11)On_FC_SCRIPT_FCS_STARTPROG packets to port 910. DATAC RealWin is a SCADA server product that operates a single PC or multiple PCs over a TCP/IP network. DATAC RealWin SCADA Server can exploit vulnerabilities for buffer overflow attacks due to incorrect validation of user-supplied input. Successful exploitation of a vulnerability can execute arbitrary code in an application security context. DATAC RealWin is prone to multiple remote buffer-overflow vulnerabilities because of a failure to properly bounds check user-supplied input. Failed exploit attempts will cause a denial-of-service condition. \nDATAC RealWin versions 2.1 and prior are vulnerable; other versions may also be affected. ----------------------------------------------------------------------\n\n\nMeet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March). \n\nhttp://secunia.com/company/events/mms_2011/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nRealWin FlexWin Connection Packet Processing Buffer Overflow\nVulnerabilities\n\nSECUNIA ADVISORY ID:\nSA43848\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/43848/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43848\n\nRELEASE DATE:\n2011-03-22\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/43848/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/43848/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43848\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nLuigi Auriemma has discovered multiple vulnerabilities in RealWin,\nwhich can be exploited by malicious people to compromise a vulnerable\nsystem. \n\n6) An input validation error when processing\n\"On_FC_MISC_FCS_MSGBROADCAST\" packets can be exploited to cause a\nheap-based buffer overflow via a specially crafted packet sent to TCP\nport 910. \n\n7) An input validation error when processing \"On_FC_MISC_FCS_MSGSEND\"\npackets can be exploited to cause a heap-based buffer overflow via a\nspecially crafted packet sent to TCP port 910. \n\nThe vulnerabilities are confirmed in version 2.1 Build 6.1.10.10. \n\nSOLUTION:\nRestrict access to trusted hosts only (e.g. via network access\ncontrol lists). \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/realwin_2-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_3-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_4-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_5-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_6-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_7-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_8-adv.txt\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2011-1563" }, { "db": "JVNDB", "id": "JVNDB-2011-001669" }, { "db": "CNVD", "id": "CNVD-2011-1159" }, { "db": "BID", "id": "46937" }, { "db": "IVD", "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1" }, { "db": "IVD", "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d" }, { "db": "PACKETSTORM", "id": "99614" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "46937", "trust": 3.3 }, { "db": "NVD", "id": "CVE-2011-1563", "trust": 3.1 }, { "db": "SECUNIA", "id": "43848", "trust": 2.5 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-11-080-04", "trust": 2.4 }, { "db": "VUPEN", "id": "ADV-2011-0742", "trust": 1.6 }, { "db": "EXPLOIT-DB", "id": "17025", "trust": 1.6 }, { "db": "CNVD", "id": "CNVD-2011-1159", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201104-025", "trust": 1.0 }, { "db": "SREASON", "id": "8176", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2011-001669", "trust": 0.8 }, { "db": "CERT/CC", "id": "HTTP://WWW.US-CERT.GOV/CONTROL_SYSTEMS/PDF/ICS-ALERT-11-080-04.PDF", "trust": 0.6 }, { "db": "IVD", "id": "7D79F7A1-463F-11E9-ACD1-000C29342CB1", "trust": 0.2 }, { "db": "IVD", "id": "FC45BAAC-1F9A-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "99614", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1" }, { "db": "IVD", "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1159" }, { "db": "BID", "id": "46937" }, { "db": "JVNDB", "id": "JVNDB-2011-001669" }, { "db": "PACKETSTORM", "id": "99614" }, { "db": "CNNVD", "id": "CNNVD-201104-025" }, { "db": "NVD", "id": "CVE-2011-1563" } ] }, "id": "VAR-201104-0287", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1" }, { "db": "IVD", "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1159" } ], "trust": 1.561607135 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1" }, { "db": "IVD", "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1159" } ] }, "last_update_date": "2024-11-23T22:42:51.953000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Alert Update: RealWin vulnerability resolved", "trust": 0.8, "url": "http://realflex.com/news/alert-update-realwin-vulnerability-resolved" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001669" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001669" }, { "db": "NVD", "id": "CVE-2011-1563" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-11-080-04.pdf" }, { "trust": 2.4, "url": "http://secunia.com/advisories/43848" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/46937" }, { "trust": 1.9, "url": "http://aluigi.org/adv/realwin_2-adv.txt" }, { "trust": 1.9, "url": "http://aluigi.org/adv/realwin_3-adv.txt" }, { "trust": 1.9, "url": "http://aluigi.org/adv/realwin_4-adv.txt" }, { "trust": 1.9, "url": "http://aluigi.org/adv/realwin_5-adv.txt" }, { "trust": 1.9, "url": "http://aluigi.org/adv/realwin_7-adv.txt" }, { "trust": 1.9, "url": "http://aluigi.org/adv/realwin_8-adv.txt" }, { "trust": 1.6, "url": "http://www.vupen.com/english/advisories/2011/0742" }, { "trust": 1.6, "url": "http://www.exploit-db.com/exploits/17025" }, { "trust": 1.0, "url": "http://securityreason.com/securityalert/8176" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1563" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1563" }, { "trust": 0.6, "url": "http://aluigi.org/adv/realwin_1-adv.txthttp" }, { "trust": 0.3, "url": "http://aluigi.org/adv/realwin_6-adv.txt" }, { "trust": 0.3, "url": "http://www.dataconline.com/software/realwin.php" }, { "trust": 0.3, "url": "/archive/1/517080" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/realwin_8-adv.txt" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/company/events/mms_2011/" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/realwin_2-adv.txt" }, { "trust": 0.1, "url": "http://secunia.com/advisories/43848/#comments" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/realwin_5-adv.txt" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/realwin_3-adv.txt" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/realwin_6-adv.txt" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/realwin_4-adv.txt" }, { "trust": 0.1, "url": "http://secunia.com/advisories/43848/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/realwin_7-adv.txt" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43848" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-1159" }, { "db": "BID", "id": "46937" }, { "db": "JVNDB", "id": "JVNDB-2011-001669" }, { "db": "PACKETSTORM", "id": "99614" }, { "db": "CNNVD", "id": "CNNVD-201104-025" }, { "db": "NVD", "id": "CVE-2011-1563" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1" }, { "db": "IVD", "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1159" }, { "db": "BID", "id": "46937" }, { "db": "JVNDB", "id": "JVNDB-2011-001669" }, { "db": "PACKETSTORM", "id": "99614" }, { "db": "CNNVD", "id": "CNNVD-201104-025" }, { "db": "NVD", "id": "CVE-2011-1563" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-03-22T00:00:00", "db": "IVD", "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1" }, { "date": "2011-03-22T00:00:00", "db": "IVD", "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d" }, { "date": "2011-03-22T00:00:00", "db": "CNVD", "id": "CNVD-2011-1159" }, { "date": "2011-03-21T00:00:00", "db": "BID", "id": "46937" }, { "date": "2011-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001669" }, { "date": "2011-03-22T02:52:36", "db": "PACKETSTORM", "id": "99614" }, { "date": "2011-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201104-025" }, { "date": "2011-04-05T15:19:35.930000", "db": "NVD", "id": "CVE-2011-1563" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-03-22T00:00:00", "db": "CNVD", "id": "CNVD-2011-1159" }, { "date": "2015-04-13T21:01:00", "db": "BID", "id": "46937" }, { "date": "2011-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001669" }, { "date": "2011-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201104-025" }, { "date": "2024-11-21T01:26:36.460000", "db": "NVD", "id": "CVE-2011-1563" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201104-025" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DATAC RealFlex RealWin of HMI Application stack-based buffer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001669" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "7d79f7a1-463f-11e9-acd1-000c29342cb1" }, { "db": "IVD", "id": "fc45baac-1f9a-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201104-025" } ], "trust": 1.0 } }
var-201104-0288
Vulnerability from variot
Multiple integer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via crafted (1) On_FC_MISC_FCS_MSGBROADCAST and (2) On_FC_MISC_FCS_MSGSEND packets, which trigger a heap-based buffer overflow. DATAC RealWin is a SCADA server product that operates a single PC or multiple PCs over a TCP/IP network. DATAC RealWin SCADA Server can exploit vulnerabilities for buffer overflow attacks due to incorrect validation of user-supplied input. Successful exploitation of a vulnerability can execute arbitrary code in an application security context. DATAC RealWin is prone to multiple remote buffer-overflow vulnerabilities because of a failure to properly bounds check user-supplied input. Failed exploit attempts will cause a denial-of-service condition. DATAC RealWin versions 2.1 and prior are vulnerable; other versions may also be affected. ----------------------------------------------------------------------
Meet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March).
http://secunia.com/company/events/mms_2011/
TITLE: RealWin FlexWin Connection Packet Processing Buffer Overflow Vulnerabilities
SECUNIA ADVISORY ID: SA43848
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43848/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43848
RELEASE DATE: 2011-03-22
DISCUSS ADVISORY: http://secunia.com/advisories/43848/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/43848/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=43848
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Luigi Auriemma has discovered multiple vulnerabilities in RealWin, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerabilities are confirmed in version 2.1 Build 6.1.10.10.
SOLUTION: Restrict access to trusted hosts only (e.g. via network access control lists).
PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma
ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/realwin_2-adv.txt http://aluigi.altervista.org/adv/realwin_3-adv.txt http://aluigi.altervista.org/adv/realwin_4-adv.txt http://aluigi.altervista.org/adv/realwin_5-adv.txt http://aluigi.altervista.org/adv/realwin_6-adv.txt http://aluigi.altervista.org/adv/realwin_7-adv.txt http://aluigi.altervista.org/adv/realwin_8-adv.txt
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201104-0288", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "realwin", "scope": "eq", "trust": 1.6, "vendor": "realflex", "version": "2.0" }, { "model": "realwin", "scope": "eq", "trust": 1.6, "vendor": "realflex", "version": "1.06" }, { "model": "realwin", "scope": "lte", "trust": 1.0, "vendor": "realflex", "version": "2.1" }, { "model": "control international realwin scada server", "scope": "eq", "trust": 0.9, "vendor": "datac", "version": "1.06" }, { "model": "control international realwin scada server", "scope": "eq", "trust": 0.9, "vendor": "datac", "version": "2.0" }, { "model": "control international realwin scada server", "scope": "eq", "trust": 0.9, "vendor": "datac", "version": "2.1" }, { "model": "control international realwin scada server", "scope": "eq", "trust": 0.9, "vendor": "datac", "version": "2.1.10" }, { "model": "realwin", "scope": "lt", "trust": 0.8, "vendor": "realflex", "version": "2.1.12" }, { "model": "control international realwin scada server (build", "scope": "eq", "trust": 0.6, "vendor": "datac", "version": "2.16.1.10.10)" }, { "model": "realwin", "scope": "eq", "trust": 0.6, "vendor": "realflex", "version": "2.1" }, { "model": "control international realwin scada server (build", "scope": "eq", "trust": 0.3, "vendor": "datac", "version": "2.16.1.10.10" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-1159" }, { "db": "BID", "id": "46937" }, { "db": "JVNDB", "id": "JVNDB-2011-001670" }, { "db": "CNNVD", "id": "CNNVD-201104-026" }, { "db": "NVD", "id": "CVE-2011-1564" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:realflex:realwin", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001670" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma", "sources": [ { "db": "BID", "id": "46937" } ], "trust": 0.3 }, "cve": "CVE-2011-1564", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2011-1564", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-1564", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2011-1564", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201104-026", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001670" }, { "db": "CNNVD", "id": "CNNVD-201104-026" }, { "db": "NVD", "id": "CVE-2011-1564" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple integer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via crafted (1) On_FC_MISC_FCS_MSGBROADCAST and (2) On_FC_MISC_FCS_MSGSEND packets, which trigger a heap-based buffer overflow. DATAC RealWin is a SCADA server product that operates a single PC or multiple PCs over a TCP/IP network. DATAC RealWin SCADA Server can exploit vulnerabilities for buffer overflow attacks due to incorrect validation of user-supplied input. Successful exploitation of a vulnerability can execute arbitrary code in an application security context. DATAC RealWin is prone to multiple remote buffer-overflow vulnerabilities because of a failure to properly bounds check user-supplied input. Failed exploit attempts will cause a denial-of-service condition. \nDATAC RealWin versions 2.1 and prior are vulnerable; other versions may also be affected. ----------------------------------------------------------------------\n\n\nMeet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March). \n\nhttp://secunia.com/company/events/mms_2011/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nRealWin FlexWin Connection Packet Processing Buffer Overflow\nVulnerabilities\n\nSECUNIA ADVISORY ID:\nSA43848\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/43848/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43848\n\nRELEASE DATE:\n2011-03-22\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/43848/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/43848/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43848\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nLuigi Auriemma has discovered multiple vulnerabilities in RealWin,\nwhich can be exploited by malicious people to compromise a vulnerable\nsystem. \n\nThe vulnerabilities are confirmed in version 2.1 Build 6.1.10.10. \n\nSOLUTION:\nRestrict access to trusted hosts only (e.g. via network access\ncontrol lists). \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/realwin_2-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_3-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_4-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_5-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_6-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_7-adv.txt\nhttp://aluigi.altervista.org/adv/realwin_8-adv.txt\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2011-1564" }, { "db": "JVNDB", "id": "JVNDB-2011-001670" }, { "db": "CNVD", "id": "CNVD-2011-1159" }, { "db": "BID", "id": "46937" }, { "db": "PACKETSTORM", "id": "99614" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "46937", "trust": 3.3 }, { "db": "NVD", "id": "CVE-2011-1564", "trust": 2.7 }, { "db": "SECUNIA", "id": "43848", "trust": 2.5 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-11-080-04", "trust": 2.4 }, { "db": "VUPEN", "id": "ADV-2011-0742", "trust": 1.6 }, { "db": "EXPLOIT-DB", "id": "17025", "trust": 1.6 }, { "db": "SREASON", "id": "8177", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2011-001670", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2011-1159", "trust": 0.6 }, { "db": "CERT/CC", "id": "HTTP://WWW.US-CERT.GOV/CONTROL_SYSTEMS/PDF/ICS-ALERT-11-080-04.PDF", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201104-026", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "99614", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-1159" }, { "db": "BID", "id": "46937" }, { "db": "JVNDB", "id": "JVNDB-2011-001670" }, { "db": "PACKETSTORM", "id": "99614" }, { "db": "CNNVD", "id": "CNNVD-201104-026" }, { "db": "NVD", "id": "CVE-2011-1564" } ] }, "id": "VAR-201104-0288", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2011-1159" } ], "trust": 1.1616071350000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-1159" } ] }, "last_update_date": "2024-11-23T22:42:51.915000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Alert Update: RealWin vulnerability resolved", "trust": 0.8, "url": "http://realflex.com/news/alert-update-realwin-vulnerability-resolved" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001670" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-189", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001670" }, { "db": "NVD", "id": "CVE-2011-1564" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-11-080-04.pdf" }, { "trust": 2.4, "url": "http://secunia.com/advisories/43848" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/46937" }, { "trust": 1.9, "url": "http://aluigi.org/adv/realwin_6-adv.txt" }, { "trust": 1.6, "url": "http://www.vupen.com/english/advisories/2011/0742" }, { "trust": 1.6, "url": "http://www.exploit-db.com/exploits/17025" }, { "trust": 1.0, "url": "http://securityreason.com/securityalert/8177" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1564" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1564" }, { "trust": 0.6, "url": "http://aluigi.org/adv/realwin_1-adv.txthttp" }, { "trust": 0.3, "url": "http://aluigi.org/adv/realwin_2-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/realwin_3-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/realwin_4-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/realwin_5-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/realwin_7-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/realwin_8-adv.txt" }, { "trust": 0.3, "url": "http://www.dataconline.com/software/realwin.php" }, { "trust": 0.3, "url": "/archive/1/517080" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/realwin_8-adv.txt" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/company/events/mms_2011/" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/realwin_2-adv.txt" }, { "trust": 0.1, "url": "http://secunia.com/advisories/43848/#comments" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/realwin_5-adv.txt" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/realwin_3-adv.txt" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/realwin_6-adv.txt" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/realwin_4-adv.txt" }, { "trust": 0.1, "url": "http://secunia.com/advisories/43848/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/realwin_7-adv.txt" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43848" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-1159" }, { "db": "BID", "id": "46937" }, { "db": "JVNDB", "id": "JVNDB-2011-001670" }, { "db": "PACKETSTORM", "id": "99614" }, { "db": "CNNVD", "id": "CNNVD-201104-026" }, { "db": "NVD", "id": "CVE-2011-1564" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2011-1159" }, { "db": "BID", "id": "46937" }, { "db": "JVNDB", "id": "JVNDB-2011-001670" }, { "db": "PACKETSTORM", "id": "99614" }, { "db": "CNNVD", "id": "CNNVD-201104-026" }, { "db": "NVD", "id": "CVE-2011-1564" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-03-22T00:00:00", "db": "CNVD", "id": "CNVD-2011-1159" }, { "date": "2011-03-21T00:00:00", "db": "BID", "id": "46937" }, { "date": "2011-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001670" }, { "date": "2011-03-22T02:52:36", "db": "PACKETSTORM", "id": "99614" }, { "date": "2011-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201104-026" }, { "date": "2011-04-05T15:19:35.963000", "db": "NVD", "id": "CVE-2011-1564" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-03-22T00:00:00", "db": "CNVD", "id": "CNVD-2011-1159" }, { "date": "2015-04-13T21:01:00", "db": "BID", "id": "46937" }, { "date": "2011-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001670" }, { "date": "2011-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201104-026" }, { "date": "2024-11-21T01:26:36.597000", "db": "NVD", "id": "CVE-2011-1564" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201104-026" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DATAC RealFlex RealWin of HMI Application integer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001670" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201104-026" } ], "trust": 0.6 } }
var-201011-0106
Vulnerability from variot
Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests. RealFlex RealWin HMI service (912/tcp) Contains multiple stack buffer overflow vulnerabilities. RealFlex RealWin HMI service (912/tcp) Contains two stack buffer overflow vulnerabilities. The first one is, SCPC_INITIALIZE() and SCPC_INITIALIZE_RF() In the function sprintf() Use, the second is SCPC_TXTEVENT() In the function strcpy() Due to the use of each.RealFlex RealWin HMI Service disruption by a third party with access to the service (DoS) An attacker may be attacked or execute arbitrary code. RealWin is a data acquisition and monitoring control system (SCADA) server product running on the Windows platform. - A boundary error occurred while processing the \"SCPC_INITIALIZE\" and \"SCPC_INITIALIZE_RF\" messages. Sending a specially constructed message to the TCP 912 port triggered a stack-based buffer overflow. - Handling \"SCPC_TXTEVENT\" messages with boundary errors, sending specially constructed messages to the TCP 912 port can trigger a stack-based buffer overflow. Failed exploit attempts will cause a denial-of-service condition. DATAC RealWin versions 2.0 and prior are vulnerable; other versions may also be affected. ----------------------------------------------------------------------
Windows Applications Insecure Library Loading
The Official, Verified Secunia List: http://secunia.com/advisories/windows_insecure_library_loading/
The list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected.
TITLE: RealWin Packet Processing Buffer Overflow Vulnerabilities
SECUNIA ADVISORY ID: SA41849
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/41849/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=41849
RELEASE DATE: 2010-10-18
DISCUSS ADVISORY: http://secunia.com/advisories/41849/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/41849/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=41849
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Luigi Auriemma has discovered two vulnerabilities in RealWin, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
The vulnerabilities are confirmed in RealWin 2.1 Build 6.1.8.10.
SOLUTION: Restrict network access to trusted users only.
PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma
ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/realwin_1-adv.txt
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201011-0106", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "realwin", "scope": "eq", "trust": 2.2, "vendor": "realflex", "version": "1.06" }, { "model": "realwin", "scope": "eq", "trust": 2.2, "vendor": "realflex", "version": "2.0" }, { "model": "realwin build", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "2.16.1.8.10" }, { "model": "control international realwin scada server", "scope": "eq", "trust": 0.9, "vendor": "datac", "version": "1.06" }, { "model": "control international realwin scada server", "scope": "eq", "trust": 0.9, "vendor": "datac", "version": "2.0" }, { "model": null, "scope": "eq", "trust": 0.8, "vendor": "realwin", "version": "1.06" }, { "model": null, "scope": "eq", "trust": 0.8, "vendor": "realwin", "version": "2.0" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "realflex", "version": null }, { "model": "realwin", "scope": "lt", "trust": 0.8, "vendor": "realflex", "version": "2.1.10 (2.1 build 6.1.10.10) earlier" }, { "model": "control international realwin scada server", "scope": "ne", "trust": 0.3, "vendor": "datac", "version": "2.1.10" } ], "sources": [ { "db": "IVD", "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1" }, { "db": "IVD", "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79344f-463f-11e9-a630-000c29342cb1" }, { "db": "IVD", "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d775f90-463f-11e9-bc81-000c29342cb1" }, { "db": "CERT/CC", "id": "VU#222657" }, { "db": "CNVD", "id": "CNVD-2010-2367" }, { "db": "CNVD", "id": "CNVD-2010-2654" }, { "db": "CNVD", "id": "CNVD-2010-2643" }, { "db": "BID", "id": "44150" }, { "db": "JVNDB", "id": "JVNDB-2010-002532" }, { "db": "CNNVD", "id": "CNNVD-201011-011" }, { "db": "NVD", "id": "CVE-2010-4142" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:realflex:realwin", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-002532" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma", "sources": [ { "db": "BID", "id": "44150" }, { "db": "CNNVD", "id": "CNNVD-201011-011" } ], "trust": 0.9 }, "cve": "CVE-2010-4142", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2010-4142", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2010-4142", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:P/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": null, "accessVector": null, "authentication": null, "author": "IVD", "availabilityImpact": null, "baseScore": null, "confidentialityImpact": null, "exploitabilityScore": null, "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d", "impactScore": null, "integrityImpact": null, "severity": null, "trust": 0.2, "vectorString": null, "version": "unknown" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "7d79344f-463f-11e9-a630-000c29342cb1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "7d775f90-463f-11e9-bc81-000c29342cb1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2010-4142", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#222657", "trust": 0.8, "value": "12.07" }, { "author": "NVD", "id": "CVE-2010-4142", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201011-011", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "IVD", "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "7d79344f-463f-11e9-a630-000c29342cb1", "trust": 0.2, "value": "CRITICAL" }, { "author": "IVD", "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "IVD", "id": "7d775f90-463f-11e9-bc81-000c29342cb1", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1" }, { "db": "IVD", "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79344f-463f-11e9-a630-000c29342cb1" }, { "db": "IVD", "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d775f90-463f-11e9-bc81-000c29342cb1" }, { "db": "CERT/CC", "id": "VU#222657" }, { "db": "JVNDB", "id": "JVNDB-2010-002532" }, { "db": "CNNVD", "id": "CNNVD-201011-011" }, { "db": "NVD", "id": "CVE-2010-4142" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests. RealFlex RealWin HMI service (912/tcp) Contains multiple stack buffer overflow vulnerabilities. RealFlex RealWin HMI service (912/tcp) Contains two stack buffer overflow vulnerabilities. The first one is, SCPC_INITIALIZE() and SCPC_INITIALIZE_RF() In the function sprintf() Use, the second is SCPC_TXTEVENT() In the function strcpy() Due to the use of each.RealFlex RealWin HMI Service disruption by a third party with access to the service (DoS) An attacker may be attacked or execute arbitrary code. RealWin is a data acquisition and monitoring control system (SCADA) server product running on the Windows platform. - A boundary error occurred while processing the \\\"SCPC_INITIALIZE\\\" and \\\"SCPC_INITIALIZE_RF\\\" messages. Sending a specially constructed message to the TCP 912 port triggered a stack-based buffer overflow. - Handling \\\"SCPC_TXTEVENT\\\" messages with boundary errors, sending specially constructed messages to the TCP 912 port can trigger a stack-based buffer overflow. Failed exploit attempts will cause a denial-of-service condition. \nDATAC RealWin versions 2.0 and prior are vulnerable; other versions may also be affected. ----------------------------------------------------------------------\n\n\nWindows Applications Insecure Library Loading\n\nThe Official, Verified Secunia List:\nhttp://secunia.com/advisories/windows_insecure_library_loading/\n\nThe list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected. \n\n\n----------------------------------------------------------------------\n\nTITLE:\nRealWin Packet Processing Buffer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA41849\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/41849/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41849\n\nRELEASE DATE:\n2010-10-18\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/41849/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/41849/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41849\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nLuigi Auriemma has discovered two vulnerabilities in RealWin, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService) and potentially compromise a vulnerable system. \n\nThe vulnerabilities are confirmed in RealWin 2.1 Build 6.1.8.10. \n\nSOLUTION:\nRestrict network access to trusted users only. \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/realwin_1-adv.txt\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2010-4142" }, { "db": "CERT/CC", "id": "VU#222657" }, { "db": "JVNDB", "id": "JVNDB-2010-002532" }, { "db": "CNVD", "id": "CNVD-2010-2367" }, { "db": "CNVD", "id": "CNVD-2010-2654" }, { "db": "CNVD", "id": "CNVD-2010-2643" }, { "db": "BID", "id": "44150" }, { "db": "IVD", "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1" }, { "db": "IVD", "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79344f-463f-11e9-a630-000c29342cb1" }, { "db": "IVD", "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d775f90-463f-11e9-bc81-000c29342cb1" }, { "db": "PACKETSTORM", "id": "94927" } ], "trust": 5.4 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-4142", "trust": 4.7 }, { "db": "SECUNIA", "id": "41849", "trust": 4.3 }, { "db": "BID", "id": "44150", "trust": 2.7 }, { "db": "EXPLOIT-DB", "id": "15337", "trust": 2.4 }, { "db": "CERT/CC", "id": "VU#222657", "trust": 1.9 }, { "db": "EXPLOIT-DB", "id": "15259", "trust": 1.6 }, { "db": "CNNVD", "id": "CNNVD-201011-011", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2010-2643", "trust": 1.0 }, { "db": "CNVD", "id": "CNVD-2010-2367", "trust": 1.0 }, { "db": "CNVD", "id": "CNVD-2010-2654", "trust": 1.0 }, { "db": "ICS CERT", "id": "ICSA-10-313-01", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2010-002532", "trust": 0.8 }, { "db": "IVD", "id": "5BDDCCE8-1FAA-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "7D7EB28F-463F-11E9-90C2-000C29342CB1", "trust": 0.2 }, { "db": "IVD", "id": "354CDFC2-1FAC-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "7D79344F-463F-11E9-A630-000C29342CB1", "trust": 0.2 }, { "db": "IVD", "id": "B50A7FF6-2355-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "7D775F90-463F-11E9-BC81-000C29342CB1", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "94927", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1" }, { "db": "IVD", "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79344f-463f-11e9-a630-000c29342cb1" }, { "db": "IVD", "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d775f90-463f-11e9-bc81-000c29342cb1" }, { "db": "CERT/CC", "id": "VU#222657" }, { "db": "CNVD", "id": "CNVD-2010-2367" }, { "db": "CNVD", "id": "CNVD-2010-2654" }, { "db": "CNVD", "id": "CNVD-2010-2643" }, { "db": "BID", "id": "44150" }, { "db": "JVNDB", "id": "JVNDB-2010-002532" }, { "db": "PACKETSTORM", "id": "94927" }, { "db": "CNNVD", "id": "CNNVD-201011-011" }, { "db": "NVD", "id": "CVE-2010-4142" } ] }, "id": "VAR-201011-0106", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1" }, { "db": "IVD", "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79344f-463f-11e9-a630-000c29342cb1" }, { "db": "IVD", "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d775f90-463f-11e9-bc81-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2010-2367" }, { "db": "CNVD", "id": "CNVD-2010-2654" }, { "db": "CNVD", "id": "CNVD-2010-2643" } ], "trust": 3.70773809 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 3.0 } ], "sources": [ { "db": "IVD", "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1" }, { "db": "IVD", "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79344f-463f-11e9-a630-000c29342cb1" }, { "db": "IVD", "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d775f90-463f-11e9-bc81-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2010-2367" }, { "db": "CNVD", "id": "CNVD-2010-2654" }, { "db": "CNVD", "id": "CNVD-2010-2643" } ] }, "last_update_date": "2024-11-23T23:10:06.264000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RealFlex Online Support System (\u767b\u9332\u30e6\u30fc\u30b6\u306e\u307f)", "trust": 0.8, "url": "http://cs.realflex.com/cs/index.ssp" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.realflex.com" }, { "title": "Patch for DATAC RealWin Stack Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/1586" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-2643" }, { "db": "JVNDB", "id": "JVNDB-2010-002532" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-002532" }, { "db": "NVD", "id": "CVE-2010-4142" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.6, "url": "http://secunia.com/advisories/41849" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/44150" }, { "trust": 1.6, "url": "http://www.exploit-db.com/exploits/15337" }, { "trust": 1.6, "url": "http://www.exploit-db.com/exploits/15259" }, { "trust": 1.6, "url": "http://aluigi.org/adv/realwin_1-adv.txt" }, { "trust": 1.2, "url": "http://aluigi.altervista.org/adv/realwin_1-adv.txt" }, { "trust": 1.1, "url": "http://www.kb.cert.org/vuls/id/222657" }, { "trust": 0.8, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-10-313-01.pdf" }, { "trust": 0.8, "url": "http://www.exploit-db.com/exploits/15337/" }, { "trust": 0.8, "url": "http://www.realflex.com/products/realwin/realwin.php" }, { "trust": 0.8, "url": "http://cs.realflex.com/cs/index.ssp" }, { "trust": 0.8, "url": "https://www.metasploit.com/redmine/projects/framework/repository/revisions/11067/entry/modules/exploits/windows/scada/realwin_10.rb" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4142" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu222657" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4142" }, { "trust": 0.7, "url": "http://secunia.com/advisories/41849/" }, { "trust": 0.3, "url": "http://www.realflex.com/" }, { "trust": 0.3, "url": "http://www.dataconline.com/software/realwin.php" }, { "trust": 0.3, "url": "http://www.realflex.com" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/41849/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41849" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/windows_insecure_library_loading/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#222657" }, { "db": "CNVD", "id": "CNVD-2010-2367" }, { "db": "CNVD", "id": "CNVD-2010-2654" }, { "db": "CNVD", "id": "CNVD-2010-2643" }, { "db": "BID", "id": "44150" }, { "db": "JVNDB", "id": "JVNDB-2010-002532" }, { "db": "PACKETSTORM", "id": "94927" }, { "db": "CNNVD", "id": "CNNVD-201011-011" }, { "db": "NVD", "id": "CVE-2010-4142" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1" }, { "db": "IVD", "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79344f-463f-11e9-a630-000c29342cb1" }, { "db": "IVD", "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d775f90-463f-11e9-bc81-000c29342cb1" }, { "db": "CERT/CC", "id": "VU#222657" }, { "db": "CNVD", "id": "CNVD-2010-2367" }, { "db": "CNVD", "id": "CNVD-2010-2654" }, { "db": "CNVD", "id": "CNVD-2010-2643" }, { "db": "BID", "id": "44150" }, { "db": "JVNDB", "id": "JVNDB-2010-002532" }, { "db": "PACKETSTORM", "id": "94927" }, { "db": "CNNVD", "id": "CNNVD-201011-011" }, { "db": "NVD", "id": "CVE-2010-4142" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-11-03T00:00:00", "db": "IVD", "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d" }, { "date": "2010-10-19T00:00:00", "db": "IVD", "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1" }, { "date": "2010-10-19T00:00:00", "db": "IVD", "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d" }, { "date": "2010-11-04T00:00:00", "db": "IVD", "id": "7d79344f-463f-11e9-a630-000c29342cb1" }, { "date": "2010-11-04T00:00:00", "db": "IVD", "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d" }, { "date": "2010-11-03T00:00:00", "db": "IVD", "id": "7d775f90-463f-11e9-bc81-000c29342cb1" }, { "date": "2010-11-19T00:00:00", "db": "CERT/CC", "id": "VU#222657" }, { "date": "2010-10-19T00:00:00", "db": "CNVD", "id": "CNVD-2010-2367" }, { "date": "2010-11-04T00:00:00", "db": "CNVD", "id": "CNVD-2010-2654" }, { "date": "2010-11-03T00:00:00", "db": "CNVD", "id": "CNVD-2010-2643" }, { "date": "2010-10-15T00:00:00", "db": "BID", "id": "44150" }, { "date": "2010-12-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-002532" }, { "date": "2010-10-18T03:06:45", "db": "PACKETSTORM", "id": "94927" }, { "date": "2010-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201011-011" }, { "date": "2010-11-02T02:26:36.693000", "db": "NVD", "id": "CVE-2010-4142" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-11-23T00:00:00", "db": "CERT/CC", "id": "VU#222657" }, { "date": "2010-10-19T00:00:00", "db": "CNVD", "id": "CNVD-2010-2367" }, { "date": "2010-11-04T00:00:00", "db": "CNVD", "id": "CNVD-2010-2654" }, { "date": "2010-11-03T00:00:00", "db": "CNVD", "id": "CNVD-2010-2643" }, { "date": "2010-11-19T18:26:00", "db": "BID", "id": "44150" }, { "date": "2010-12-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-002532" }, { "date": "2010-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201011-011" }, { "date": "2024-11-21T01:20:17.743000", "db": "NVD", "id": "CVE-2010-4142" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201011-011" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DATAC RealWin Multiple Stack Buffer Overflow Vulnerabilities", "sources": [ { "db": "IVD", "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d775f90-463f-11e9-bc81-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2010-2643" } ], "trust": 1.0 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "5bddcce8-1faa-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d7eb28f-463f-11e9-90c2-000c29342cb1" }, { "db": "IVD", "id": "354cdfc2-1fac-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79344f-463f-11e9-a630-000c29342cb1" }, { "db": "IVD", "id": "b50a7ff6-2355-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d775f90-463f-11e9-bc81-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201011-011" } ], "trust": 1.8 } }
var-201209-0244
Vulnerability from variot
Multiple untrusted search path vulnerabilities in RealFlex RealWin before 2.1.13, FlexView before 3.1.86, and RealWinDemo before 2.1.13 allow local users to gain privileges via a Trojan horse (1) realwin.dll or (2) keyhook.dll file in the current working directory. plural RealFlex There is a vulnerability in the product that can be obtained because the processing related to the search path is incomplete. Supplementary information : CWE Vulnerability type by CWE-426: Untrusted Search Path ( Unreliable search path ) Has been identified. (1) realwin.dll Or (2) keyhook.dll It may be possible to get permission through the file. RealWin is a data acquisition and monitoring control system (SCADA) server product running on the Windows platform. FlexView is a human interface product for Eston Automation. Multiple RealFlex products are not installed in the library file, and an attacker can build a malicious DLL file, store it in a remote WebDAV or SMB share, entice the application to parse, and execute arbitrary code in the application context. Multiple RealFlex products are prone to an insecure library loading vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201209-0244", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "realwin", "scope": "eq", "trust": 1.6, "vendor": "realflex", "version": "1.06" }, { "model": "realwin", "scope": "eq", "trust": 1.6, "vendor": "realflex", "version": "2.1" }, { "model": "realwin", "scope": "eq", "trust": 1.6, "vendor": "realflex", "version": "2.0" }, { "model": "realwin", "scope": "lte", "trust": 1.0, "vendor": "realflex", "version": "2.1.12" }, { "model": "flexview", "scope": "lte", "trust": 1.0, "vendor": "realflex", "version": "3.1.85" }, { "model": "realwindemo", "scope": "lte", "trust": 1.0, "vendor": "realflex", "version": "2.1.12" }, { "model": "flexview", "scope": "lt", "trust": 0.8, "vendor": "realflex", "version": "3.1.86" }, { "model": "realwin", "scope": "lt", "trust": 0.8, "vendor": "realflex", "version": "2.1.13" }, { "model": "realwindemo", "scope": "lt", "trust": 0.8, "vendor": "realflex", "version": "2.1.13" }, { "model": "realwindemo", "scope": "lte", "trust": 0.6, "vendor": "realflex", "version": "\u003c=2.1.12" }, { "model": "realwin", "scope": "lte", "trust": 0.6, "vendor": "realflex", "version": "\u003c=2.1.12" }, { "model": "flexview", "scope": "lte", "trust": 0.6, "vendor": "realflex", "version": "\u003c=3.1.85" }, { "model": "realwindemo", "scope": "eq", "trust": 0.6, "vendor": "realflex", "version": "2.1.12" }, { "model": "realwin", "scope": "eq", "trust": 0.6, "vendor": "realflex", "version": "2.1.12" }, { "model": "flexview", "scope": "eq", "trust": 0.6, "vendor": "realflex", "version": "3.1.85" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "realwin", "version": "1.06" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "realwin", "version": "2.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "realwin", "version": "2.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "realwin", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "flexview", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "realwindemo", "version": "*" } ], "sources": [ { "db": "IVD", "id": "63c9cf40-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-5010" }, { "db": "JVNDB", "id": "JVNDB-2012-004246" }, { "db": "CNNVD", "id": "CNNVD-201209-148" }, { "db": "NVD", "id": "CVE-2012-3004" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:realflex:flexview", "vulnerable": true }, { "cpe22Uri": "cpe:/a:realflex:realwin", "vulnerable": true }, { "cpe22Uri": "cpe:/a:realflex:realwindemo", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-004246" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Carlos Mario Penagos Hollmann", "sources": [ { "db": "BID", "id": "55464" } ], "trust": 0.3 }, "cve": "CVE-2012-3004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CVE-2012-3004", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "63c9cf40-2353-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-3004", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-3004", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201209-148", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "63c9cf40-2353-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "63c9cf40-2353-11e6-abef-000c29c66e3d" }, { "db": "JVNDB", "id": "JVNDB-2012-004246" }, { "db": "CNNVD", "id": "CNNVD-201209-148" }, { "db": "NVD", "id": "CVE-2012-3004" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple untrusted search path vulnerabilities in RealFlex RealWin before 2.1.13, FlexView before 3.1.86, and RealWinDemo before 2.1.13 allow local users to gain privileges via a Trojan horse (1) realwin.dll or (2) keyhook.dll file in the current working directory. plural RealFlex There is a vulnerability in the product that can be obtained because the processing related to the search path is incomplete. Supplementary information : CWE Vulnerability type by CWE-426: Untrusted Search Path ( Unreliable search path ) Has been identified. (1) realwin.dll Or (2) keyhook.dll It may be possible to get permission through the file. RealWin is a data acquisition and monitoring control system (SCADA) server product running on the Windows platform. FlexView is a human interface product for Eston Automation. Multiple RealFlex products are not installed in the library file, and an attacker can build a malicious DLL file, store it in a remote WebDAV or SMB share, entice the application to parse, and execute arbitrary code in the application context. Multiple RealFlex products are prone to an insecure library loading vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2012-3004" }, { "db": "JVNDB", "id": "JVNDB-2012-004246" }, { "db": "CNVD", "id": "CNVD-2012-5010" }, { "db": "BID", "id": "55464" }, { "db": "IVD", "id": "63c9cf40-2353-11e6-abef-000c29c66e3d" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-3004", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-12-251-01", "trust": 3.3 }, { "db": "CNVD", "id": "CNVD-2012-5010", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201209-148", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-004246", "trust": 0.8 }, { "db": "BID", "id": "55464", "trust": 0.3 }, { "db": "IVD", "id": "63C9CF40-2353-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "63c9cf40-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-5010" }, { "db": "BID", "id": "55464" }, { "db": "JVNDB", "id": "JVNDB-2012-004246" }, { "db": "CNNVD", "id": "CNNVD-201209-148" }, { "db": "NVD", "id": "CVE-2012-3004" } ] }, "id": "VAR-201209-0244", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "63c9cf40-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-5010" } ], "trust": 1.2319444400000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "63c9cf40-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-5010" } ] }, "last_update_date": "2024-11-23T22:59:49.190000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.realflex.com/" }, { "title": "Multiple RealFlex product insecure libraries load patches for arbitrary code execution vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/21891" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-5010" }, { "db": "JVNDB", "id": "JVNDB-2012-004246" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-004246" }, { "db": "NVD", "id": "CVE-2012-3004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-251-01.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3004" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3004" }, { "trust": 0.3, "url": "http://realflex.com/products/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-5010" }, { "db": "BID", "id": "55464" }, { "db": "JVNDB", "id": "JVNDB-2012-004246" }, { "db": "CNNVD", "id": "CNNVD-201209-148" }, { "db": "NVD", "id": "CVE-2012-3004" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "63c9cf40-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-5010" }, { "db": "BID", "id": "55464" }, { "db": "JVNDB", "id": "JVNDB-2012-004246" }, { "db": "CNNVD", "id": "CNNVD-201209-148" }, { "db": "NVD", "id": "CVE-2012-3004" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-09-11T00:00:00", "db": "IVD", "id": "63c9cf40-2353-11e6-abef-000c29c66e3d" }, { "date": "2012-09-11T00:00:00", "db": "CNVD", "id": "CNVD-2012-5010" }, { "date": "2012-09-07T00:00:00", "db": "BID", "id": "55464" }, { "date": "2012-09-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-004246" }, { "date": "2012-09-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201209-148" }, { "date": "2012-09-08T10:28:20.510000", "db": "NVD", "id": "CVE-2012-3004" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-09-11T00:00:00", "db": "CNVD", "id": "CNVD-2012-5010" }, { "date": "2012-09-07T00:00:00", "db": "BID", "id": "55464" }, { "date": "2012-09-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-004246" }, { "date": "2012-09-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201209-148" }, { "date": "2024-11-21T01:40:06.297000", "db": "NVD", "id": "CVE-2012-3004" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "55464" }, { "db": "CNNVD", "id": "CNNVD-201209-148" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural RealFlex Vulnerability gained in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-004246" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "IVD", "id": "63c9cf40-2353-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201209-148" } ], "trust": 0.8 } }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:realflex:realwin:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1A6062A-E8AA-4653-99DD-EC1A9420422F", "versionEndIncluding": "2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:realflex:realwin:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "5C400FAA-C8A3-4549-9954-91F19C7BE50F", "vulnerable": true }, { "criteria": "cpe:2.3:a:realflex:realwin:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DE107083-8D98-419D-9EEC-8E8067E12201", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified \"On_FC_BINFILE_FCS_*FILE\", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer basado en pila en la aplicaci\u00f3n HMI en Datac RealFlex RealWin v2.1 (Build 6.1.10.10) y anteriores permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un nombre de usuario largo en un paquete (1) On_FC_CONNECT_FCS_LOGIN, y paquetes manipulados hacia el puerto 910 (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified \"On_FC_BINFILE_FCS_*FILE\", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, y (11) On_FC_SCRIPT_FCS_STARTPROG" } ], "id": "CVE-2011-1563", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-04-05T15:19:35.930", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_2-adv.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_3-adv.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_4-adv.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_5-adv.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_7-adv.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_8-adv.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43848" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/8176" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/17025" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/46937" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_2-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_3-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_4-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_5-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_7-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_8-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43848" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/17025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0742" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:realflex:realwin:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1A6062A-E8AA-4653-99DD-EC1A9420422F", "versionEndIncluding": "2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:realflex:realwin:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "5C400FAA-C8A3-4549-9954-91F19C7BE50F", "vulnerable": true }, { "criteria": "cpe:2.3:a:realflex:realwin:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DE107083-8D98-419D-9EEC-8E8067E12201", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via crafted (1) On_FC_MISC_FCS_MSGBROADCAST and (2) On_FC_MISC_FCS_MSGSEND packets, which trigger a heap-based buffer overflow." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de entero en la aplicaci\u00f3n HMI en Datac RealFlex RealWin v2.1 (Build 6.1.10.10) y anteriores permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de paquetes manipulados (1) On_FC_MISC_FCS_MSGBROADCAST y (2) On_FC_MISC_FCS_MSGSEND, que provocan un desbordamiento de b\u00fafer basado en memoria din\u00e1mica" } ], "id": "CVE-2011-1564", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-04-05T15:19:35.963", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_6-adv.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43848" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/8177" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/17025" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/46937" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_6-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43848" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/17025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/46937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0742" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf | US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:realflex:realwin:*:*:*:*:*:*:*:*", "matchCriteriaId": "623061FC-5D07-4B73-84D2-7BBAF539F046", "versionEndIncluding": "2.1.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:realflex:realwin:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "5C400FAA-C8A3-4549-9954-91F19C7BE50F", "vulnerable": true }, { "criteria": "cpe:2.3:a:realflex:realwin:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DE107083-8D98-419D-9EEC-8E8067E12201", "vulnerable": true }, { "criteria": "cpe:2.3:a:realflex:realwin:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5D51FC22-F25C-4F47-9B38-F9E6CF57E361", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:realflex:flexview:*:*:*:*:*:*:*:*", "matchCriteriaId": "695A3D6C-9E33-4FBB-84BD-9B24101C264B", "versionEndIncluding": "3.1.85", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:realflex:realwindemo:*:*:*:*:*:*:*:*", "matchCriteriaId": "69276A4F-33C4-4A95-980D-939577FE0CCD", "versionEndIncluding": "2.1.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple untrusted search path vulnerabilities in RealFlex RealWin before 2.1.13, FlexView before 3.1.86, and RealWinDemo before 2.1.13 allow local users to gain privileges via a Trojan horse (1) realwin.dll or (2) keyhook.dll file in the current working directory." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ruta de b\u00fasqueda no confiable en RealFlex RealWin antes de v2.1.13, FlexView antes de v3.1.86, y RealWinDemo antes de v2.1.13, permite a usuarios locales obtener privilegios a trav\u00e9s de un troyano (1) realwin.dll o (2) KeyHook.dll en el directorio de trabajo actual." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n\u0027CWE-426 Untrusted Search Path\u0027", "id": "CVE-2012-3004", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-09-08T10:28:20.510", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:realflex:realwin:1.06:*:*:*:*:*:*:*", "matchCriteriaId": "5C400FAA-C8A3-4549-9954-91F19C7BE50F", "vulnerable": true }, { "criteria": "cpe:2.3:a:realflex:realwin:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DE107083-8D98-419D-9EEC-8E8067E12201", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests." }, { "lang": "es", "value": "M\u00daltiples desbordamientos de buffer basados en pila en DATAC RealWin 2.0 Build 6.1.8.10 y versiones anteriores. Permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un paquete (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF o (3) SCPC_TXTEVENT. NOTA: posteriormente se report\u00f3 que la versi\u00f3n 1.06 tambi\u00e9n se ve afectada por una de estas peticiones." } ], "evaluatorComment": "http://www.vupen.com/english/advisories/2010/2714", "id": "CVE-2010-4142", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-11-02T02:26:36.693", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_1-adv.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41849" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/15259" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/15337" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/44150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://aluigi.org/adv/realwin_1-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41849" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/15259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/15337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/44150" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2011-1564 (GCVE-0-2011-1564)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/46937 | vdb-entry, x_refsource_BID | |
http://securityreason.com/securityalert/8177 | third-party-advisory, x_refsource_SREASON | |
http://aluigi.org/adv/realwin_6-adv.txt | x_refsource_MISC | |
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf | x_refsource_MISC | |
http://www.exploit-db.com/exploits/17025 | exploit, x_refsource_EXPLOIT-DB | |
http://secunia.com/advisories/43848 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2011/0742 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:28:41.935Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46937", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46937" }, { "name": "8177", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8177" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/realwin_6-adv.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf" }, { "name": "17025", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/17025" }, { "name": "43848", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43848" }, { "name": "ADV-2011-0742", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0742" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-03-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via crafted (1) On_FC_MISC_FCS_MSGBROADCAST and (2) On_FC_MISC_FCS_MSGSEND packets, which trigger a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-09-22T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "46937", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46937" }, { "name": "8177", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8177" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/realwin_6-adv.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf" }, { "name": "17025", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/17025" }, { "name": "43848", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43848" }, { "name": "ADV-2011-0742", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0742" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1564", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via crafted (1) On_FC_MISC_FCS_MSGBROADCAST and (2) On_FC_MISC_FCS_MSGSEND packets, which trigger a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46937", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46937" }, { "name": "8177", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8177" }, { "name": "http://aluigi.org/adv/realwin_6-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/realwin_6-adv.txt" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf" }, { "name": "17025", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/17025" }, { "name": "43848", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43848" }, { "name": "ADV-2011-0742", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0742" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1564", "datePublished": "2011-04-05T15:00:00", "dateReserved": "2011-04-05T00:00:00", "dateUpdated": "2024-08-06T22:28:41.935Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-3004 (GCVE-0-2012-3004)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.345Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple untrusted search path vulnerabilities in RealFlex RealWin before 2.1.13, FlexView before 3.1.86, and RealWinDemo before 2.1.13 allow local users to gain privileges via a Trojan horse (1) realwin.dll or (2) keyhook.dll file in the current working directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-08T10:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2012-3004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple untrusted search path vulnerabilities in RealFlex RealWin before 2.1.13, FlexView before 3.1.86, and RealWinDemo before 2.1.13 allow local users to gain privileges via a Trojan horse (1) realwin.dll or (2) keyhook.dll file in the current working directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2012-3004", "datePublished": "2012-09-08T10:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-17T03:23:37.476Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1563 (GCVE-0-2011-1563)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/46937 | vdb-entry, x_refsource_BID | |
http://aluigi.org/adv/realwin_2-adv.txt | x_refsource_MISC | |
http://aluigi.org/adv/realwin_7-adv.txt | x_refsource_MISC | |
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf | x_refsource_MISC | |
http://www.exploit-db.com/exploits/17025 | exploit, x_refsource_EXPLOIT-DB | |
http://aluigi.org/adv/realwin_4-adv.txt | x_refsource_MISC | |
http://secunia.com/advisories/43848 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2011/0742 | vdb-entry, x_refsource_VUPEN | |
http://aluigi.org/adv/realwin_8-adv.txt | x_refsource_MISC | |
http://aluigi.org/adv/realwin_5-adv.txt | x_refsource_MISC | |
http://aluigi.org/adv/realwin_3-adv.txt | x_refsource_MISC | |
http://securityreason.com/securityalert/8176 | third-party-advisory, x_refsource_SREASON |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:28:41.817Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46937", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46937" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/realwin_2-adv.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/realwin_7-adv.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf" }, { "name": "17025", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/17025" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/realwin_4-adv.txt" }, { "name": "43848", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43848" }, { "name": "ADV-2011-0742", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0742" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/realwin_8-adv.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/realwin_5-adv.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/realwin_3-adv.txt" }, { "name": "8176", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-03-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified \"On_FC_BINFILE_FCS_*FILE\", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-09-22T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "46937", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46937" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/realwin_2-adv.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/realwin_7-adv.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf" }, { "name": "17025", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/17025" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/realwin_4-adv.txt" }, { "name": "43848", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43848" }, { "name": "ADV-2011-0742", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0742" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/realwin_8-adv.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/realwin_5-adv.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/realwin_3-adv.txt" }, { "name": "8176", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1563", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in the HMI application in DATAC RealFlex RealWin 2.1 (Build 6.1.10.10) and earlier allow remote attackers to execute arbitrary code via (1) a long username in an On_FC_CONNECT_FCS_LOGIN packet, and crafted (2) On_FC_CTAGLIST_FCS_CADDTAG, (3) On_FC_CTAGLIST_FCS_CDELTAG, (4) On_FC_CTAGLIST_FCS_ADDTAGMS, (5) On_FC_RFUSER_FCS_LOGIN, (6) unspecified \"On_FC_BINFILE_FCS_*FILE\", (7) On_FC_CGETTAG_FCS_GETTELEMETRY, (8) On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY, (9) On_FC_CGETTAG_FCS_SETTELEMETRY, (10) On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY, and (11) On_FC_SCRIPT_FCS_STARTPROG packets to port 910." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46937", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46937" }, { "name": "http://aluigi.org/adv/realwin_2-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/realwin_2-adv.txt" }, { "name": "http://aluigi.org/adv/realwin_7-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/realwin_7-adv.txt" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf" }, { "name": "17025", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/17025" }, { "name": "http://aluigi.org/adv/realwin_4-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/realwin_4-adv.txt" }, { "name": "43848", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43848" }, { "name": "ADV-2011-0742", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0742" }, { "name": "http://aluigi.org/adv/realwin_8-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/realwin_8-adv.txt" }, { "name": "http://aluigi.org/adv/realwin_5-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/realwin_5-adv.txt" }, { "name": "http://aluigi.org/adv/realwin_3-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/realwin_3-adv.txt" }, { "name": "8176", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8176" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1563", "datePublished": "2011-04-05T15:00:00", "dateReserved": "2011-04-05T00:00:00", "dateUpdated": "2024-08-06T22:28:41.817Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4142 (GCVE-0-2010-4142)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.exploit-db.com/exploits/15259 | exploit, x_refsource_EXPLOIT-DB | |
http://www.securityfocus.com/bid/44150 | vdb-entry, x_refsource_BID | |
http://aluigi.org/adv/realwin_1-adv.txt | x_refsource_MISC | |
http://www.exploit-db.com/exploits/15337 | exploit, x_refsource_EXPLOIT-DB | |
http://secunia.com/advisories/41849 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.420Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "15259", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/15259" }, { "name": "44150", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/44150" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/realwin_1-adv.txt" }, { "name": "15337", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/15337" }, { "name": "41849", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41849" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-11-01T18:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "15259", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/15259" }, { "name": "44150", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/44150" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/realwin_1-adv.txt" }, { "name": "15337", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/15337" }, { "name": "41849", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41849" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4142", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "15259", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/15259" }, { "name": "44150", "refsource": "BID", "url": "http://www.securityfocus.com/bid/44150" }, { "name": "http://aluigi.org/adv/realwin_1-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/realwin_1-adv.txt" }, { "name": "15337", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/15337" }, { "name": "41849", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/41849" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4142", "datePublished": "2010-11-01T18:00:00Z", "dateReserved": "2010-11-01T00:00:00Z", "dateUpdated": "2024-09-16T22:08:27.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }