cnvd-2017-01561
Vulnerability from cnvd
Title
Sielco Sistemi Winlog Pro/ Winlog Lite DLL加载本地代码执行漏洞
Description
SIELCO SISTEMI Winlog是一款用于对SCADA HMI监控软件进行数据采集和远程控制的应用程序。 Sielco Sistemi Winlog Pro and Winlog Lite存在本地代码执行漏洞。攻击者利用该漏洞在受影响的应用程序中执行任意代码或使应用程序崩溃,造成拒绝服务。
Severity
Patch Name
Sielco Sistemi Winlog Pro/ Winlog Lite DLL加载本地代码执行漏洞的补丁
Patch Description
SIELCO SISTEMI Winlog是一款用于对SCADA HMI监控软件进行数据采集和远程控制的应用程序。 Sielco Sistemi Winlog Pro and Winlog Lite存在本地代码执行漏洞。攻击者利用该漏洞在受影响的应用程序中执行任意代码或使应用程序崩溃,造成拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://ics-cert.us-cert.gov/advisories/ICSA-17-038-01

Reference
http://www.securityfocus.com/bid/96119
Impacted products
Name
['SIELCO SISTEMI Winlog Pro 2.7.9', 'SIELCO SISTEMI Winlog Pro 2.7', 'SIELCO SISTEMI Winlog Pro 2.7.1', 'SIELCO SISTEMI Winlog Lite 2.07.14', 'SIELCO SISTEMI Winlog Pro 2.7.18', 'SIELCO SISTEMI Winlog Pro 2.7.16', 'SIELCO SISTEMI Winlog Lite 2.7.9', 'SIELCO SISTEMI Winlog Lite 2.07.16']
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "96119"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-5161",
      "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5161"
    }
  },
  "description": "SIELCO SISTEMI Winlog\u662f\u4e00\u6b3e\u7528\u4e8e\u5bf9SCADA HMI\u76d1\u63a7\u8f6f\u4ef6\u8fdb\u884c\u6570\u636e\u91c7\u96c6\u548c\u8fdc\u7a0b\u63a7\u5236\u7684\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nSielco Sistemi Winlog Pro and Winlog Lite\u5b58\u5728\u672c\u5730\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u53d7\u5f71\u54cd\u7684\u5e94\u7528\u7a0b\u5e8f\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\uff0c\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002",
  "discovererName": "Karn Ganeshen",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://ics-cert.us-cert.gov/advisories/ICSA-17-038-01",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-01561",
  "openTime": "2017-02-20",
  "patchDescription": "SIELCO SISTEMI Winlog\u662f\u4e00\u6b3e\u7528\u4e8e\u5bf9SCADA HMI\u76d1\u63a7\u8f6f\u4ef6\u8fdb\u884c\u6570\u636e\u91c7\u96c6\u548c\u8fdc\u7a0b\u63a7\u5236\u7684\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nSielco Sistemi Winlog Pro and Winlog Lite\u5b58\u5728\u672c\u5730\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u53d7\u5f71\u54cd\u7684\u5e94\u7528\u7a0b\u5e8f\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\uff0c\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Sielco Sistemi Winlog Pro/ Winlog Lite DLL\u52a0\u8f7d\u672c\u5730\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "SIELCO SISTEMI Winlog Pro 2.7.9",
      "SIELCO SISTEMI Winlog Pro 2.7",
      "SIELCO SISTEMI Winlog Pro 2.7.1",
      "SIELCO SISTEMI Winlog Lite 2.07.14",
      "SIELCO SISTEMI Winlog Pro 2.7.18",
      "SIELCO SISTEMI Winlog Pro 2.7.16",
      "SIELCO SISTEMI Winlog Lite 2.7.9",
      "SIELCO SISTEMI Winlog Lite  2.07.16"
    ]
  },
  "referenceLink": "http://www.securityfocus.com/bid/96119",
  "serverity": "\u4e2d",
  "submitTime": "2017-02-10",
  "title": "Sielco Sistemi Winlog Pro/ Winlog Lite DLL\u52a0\u8f7d\u672c\u5730\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…