cnvd-2016-07735
Vulnerability from cnvd
Title
多款Rockwell Automation产品缓冲区溢出漏洞
Description
Rockwell Automation RSLogix Micro Starter Lite等都是美国罗克韦尔(Rockwell Automation)公司的用于自动化产品中的配置软件。 多款Rockwell Automation产品中存在缓冲区溢出漏洞。远程攻击者可借助特制的RSS项目文件利用该漏洞执行任意代码。
Severity
Patch Name
多款Rockwell Automation产品缓冲区溢出漏洞的补丁
Patch Description
Rockwell Automation RSLogix Micro Starter Lite等都是美国罗克韦尔(Rockwell Automation)公司的用于自动化产品中的配置软件。 多款Rockwell Automation产品中存在缓冲区溢出漏洞。远程攻击者可借助特制的RSS项目文件利用该漏洞执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已经发布了升级补丁以修复此安全问题,详情请关注厂商主页: https://rockwellautomation.co/

Reference
https://ics-cert.us-cert.gov/advisories/ICSA-16-224-02
Impacted products
Name
['Rockwell Automation RSLogix 500 Professional Edition 0', 'Rockwell Automation RSLogix 500 Standard Edition 0', 'Rockwell Automation RSLogix 500 Starter Edition 0', 'Rockwell Automation RSLogix Micro Developer 0', 'Rockwell Automation RSLogix Micro Starter Lite 0']
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "92983"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2016-5814"
    }
  },
  "description": "Rockwell Automation RSLogix Micro Starter Lite\u7b49\u90fd\u662f\u7f8e\u56fd\u7f57\u514b\u97e6\u5c14\uff08Rockwell Automation\uff09\u516c\u53f8\u7684\u7528\u4e8e\u81ea\u52a8\u5316\u4ea7\u54c1\u4e2d\u7684\u914d\u7f6e\u8f6f\u4ef6\u3002\r\n\r\n\u591a\u6b3eRockwell Automation\u4ea7\u54c1\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684RSS\u9879\u76ee\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
  "discovererName": "Ariele Caltabiano (kimiya) working with Trend Micro\u00e2??s Zero Day Initiative",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a\r\nhttps://rockwellautomation.co/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2016-07735",
  "openTime": "2016-09-20",
  "patchDescription": "Rockwell Automation RSLogix Micro Starter Lite\u7b49\u90fd\u662f\u7f8e\u56fd\u7f57\u514b\u97e6\u5c14\uff08Rockwell Automation\uff09\u516c\u53f8\u7684\u7528\u4e8e\u81ea\u52a8\u5316\u4ea7\u54c1\u4e2d\u7684\u914d\u7f6e\u8f6f\u4ef6\u3002\r\n\r\n\u591a\u6b3eRockwell Automation\u4ea7\u54c1\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684RSS\u9879\u76ee\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eRockwell Automation\u4ea7\u54c1\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Rockwell Automation RSLogix 500 Professional Edition 0",
      "Rockwell Automation RSLogix 500 Standard Edition 0",
      "Rockwell Automation RSLogix 500 Starter Edition 0",
      "Rockwell Automation RSLogix Micro Developer 0",
      "Rockwell Automation RSLogix Micro Starter Lite 0"
    ]
  },
  "referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-16-224-02",
  "serverity": "\u9ad8",
  "submitTime": "2016-09-19",
  "title": "\u591a\u6b3eRockwell Automation\u4ea7\u54c1\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…