var-201012-0106
Vulnerability from variot

Buffer overflow in the lm_tcp service in Invensys Wonderware InBatch 8.1 and 9.0, as used in Invensys Foxboro I/A Series Batch 8.1 and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted request to port 9001. Invensys Wonderware InBatch and Foxboro I/A Series Batch of lm_tcp The service can experience buffer overflow. Wonderware InBatch and Foxboro I/A Batch of database lock manager (lm_tcp) The service includes 150 When copying a string to a byte buffer, a buffer overflow can occur. This service is 9001/tcp using.lm_tcp Service disruption by a third party with access to the service (DoS) An attacker may be able to attack or execute arbitrary code. RDM Embedded is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The issue affects the 'lm_tcp' service. Failed exploit attempts may crash the application, denying service to legitimate users. The issue affects lm_tcp <= 9.0.0 0248.18.0.0; other versions may also be affected. Wonderware InBatch is prone to a denial-of-service vulnerability. ----------------------------------------------------------------------

Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM).

Request a free trial: http://secunia.com/products/corporate/vim/


TITLE: Wonderware InBatch / Foxboro I/A Series "lm_tcp" Buffer Overflow Vulnerability

SECUNIA ADVISORY ID: SA42528

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/42528/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=42528

RELEASE DATE: 2010-12-24

DISCUSS ADVISORY: http://secunia.com/advisories/42528/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/42528/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=42528

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been reported in Wonderware InBatch and Foxboro I/A Series Batch, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. write 16bits with the value 0 (0x0000) to an arbitrary memory location by sending a specially crafted packet to port 9001.

SOLUTION: Apply patches when available. See vendor's advisory for possible mitigation steps.

PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma

ORIGINAL ADVISORY: Luigi Auriemma: http://aluigi.altervista.org/adv/inbatch_1-adv.txt

Invensys: http://iom.invensys.com/EN/Pages/IOM_CyberSecurityUpdates.aspx

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201012-0106",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wonderware inbatch",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "invensys",
        "version": "9.0"
      },
      {
        "model": "wonderware inbatch",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "invensys",
        "version": "8.1"
      },
      {
        "model": "foxboro i\\/a series batch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "invensys",
        "version": "8.1"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "invensys",
        "version": null
      },
      {
        "model": "i/a batch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "8.1"
      },
      {
        "model": "i/a batch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "server all supported"
      },
      {
        "model": "wonderware inbatch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "server all supported"
      },
      {
        "model": "foxboro i/a series batch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "invensys",
        "version": "8.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "wonderware inbatch",
        "version": "8.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "wonderware inbatch",
        "version": "9.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "foxboro i a series batch",
        "version": "8.1"
      },
      {
        "model": "inbatch sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wonderware",
        "version": "9.0"
      },
      {
        "model": "inbatch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wonderware",
        "version": "9.0"
      },
      {
        "model": "inbatch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wonderware",
        "version": "8.1"
      },
      {
        "model": "rdm embedded",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "raima",
        "version": "0"
      },
      {
        "model": "foxboro i%2fa series batch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "invensys",
        "version": "8.1"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d76270f-463f-11e9-9ec2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "8d6584dc-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CERT/CC",
        "id": "VU#647928"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-3346"
      },
      {
        "db": "BID",
        "id": "45245"
      },
      {
        "db": "BID",
        "id": "78742"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002872"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002656"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201012-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4557"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:invensys:foxboro_i%2Fa_series_batch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:invensys:wonderware_inbatch",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002872"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Luigi Auriemma",
    "sources": [
      {
        "db": "BID",
        "id": "45245"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2010-4557",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2010-4557",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "7d76270f-463f-11e9-9ec2-000c29342cb1",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "8d6584dc-2355-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-47162",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2010-4557",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#647928",
            "trust": 0.8,
            "value": "24.41"
          },
          {
            "author": "NVD",
            "id": "CVE-2010-4557",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201012-254",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "7d76270f-463f-11e9-9ec2-000c29342cb1",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "8d6584dc-2355-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-47162",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d76270f-463f-11e9-9ec2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "8d6584dc-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CERT/CC",
        "id": "VU#647928"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47162"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002872"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201012-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4557"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in the lm_tcp service in Invensys Wonderware InBatch 8.1 and 9.0, as used in Invensys Foxboro I/A Series Batch 8.1 and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted request to port 9001. Invensys Wonderware InBatch and Foxboro I/A Series Batch of lm_tcp The service can experience buffer overflow. Wonderware InBatch and Foxboro I/A Batch of database lock manager (lm_tcp) The service includes 150 When copying a string to a byte buffer, a buffer overflow can occur. This service is 9001/tcp using.lm_tcp Service disruption by a third party with access to the service (DoS) An attacker may be able to attack or execute arbitrary code. RDM Embedded is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The issue affects the \u0027lm_tcp\u0027 service. Failed exploit attempts may crash the application, denying service to legitimate users. \nThe issue affects lm_tcp \u0026lt;= 9.0.0 0248.18.0.0; other versions may also be affected. Wonderware InBatch is prone to a denial-of-service vulnerability. ----------------------------------------------------------------------\n\n\nSecure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). \n\nRequest a free trial: \nhttp://secunia.com/products/corporate/vim/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nWonderware InBatch / Foxboro I/A Series \"lm_tcp\" Buffer Overflow\nVulnerability\n\nSECUNIA ADVISORY ID:\nSA42528\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/42528/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42528\n\nRELEASE DATE:\n2010-12-24\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/42528/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/42528/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42528\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in Wonderware InBatch and Foxboro\nI/A Series Batch, which can be exploited by malicious people to cause\na DoS (Denial of Service) and potentially compromise a vulnerable\nsystem. write 16bits with the value 0 (0x0000) to an arbitrary\nmemory location by sending a specially crafted packet to port 9001. \n\nSOLUTION:\nApply patches when available. See vendor\u0027s advisory for possible\nmitigation steps. \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nLuigi Auriemma:\nhttp://aluigi.altervista.org/adv/inbatch_1-adv.txt\n\nInvensys:\nhttp://iom.invensys.com/EN/Pages/IOM_CyberSecurityUpdates.aspx\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-4557"
      },
      {
        "db": "CERT/CC",
        "id": "VU#647928"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002872"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002656"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-3346"
      },
      {
        "db": "BID",
        "id": "45245"
      },
      {
        "db": "BID",
        "id": "78742"
      },
      {
        "db": "IVD",
        "id": "7d76270f-463f-11e9-9ec2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "8d6584dc-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47162"
      },
      {
        "db": "PACKETSTORM",
        "id": "96969"
      }
    ],
    "trust": 4.68
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-47162",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-47162"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#647928",
        "trust": 4.7
      },
      {
        "db": "SECUNIA",
        "id": "42528",
        "trust": 4.0
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-10-348-01",
        "trust": 3.9
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4557",
        "trust": 3.8
      },
      {
        "db": "EXPLOIT-DB",
        "id": "15707",
        "trust": 2.0
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-3244",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201012-254",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-3346",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002872",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002656",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "78742",
        "trust": 0.4
      },
      {
        "db": "BID",
        "id": "45245",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "7D76270F-463F-11E9-9EC2-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "8D6584DC-2355-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-70368",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-47162",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "96969",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d76270f-463f-11e9-9ec2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "8d6584dc-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CERT/CC",
        "id": "VU#647928"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-3346"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47162"
      },
      {
        "db": "BID",
        "id": "45245"
      },
      {
        "db": "BID",
        "id": "78742"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002872"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002656"
      },
      {
        "db": "PACKETSTORM",
        "id": "96969"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201012-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4557"
      }
    ]
  },
  "id": "VAR-201012-0106",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "7d76270f-463f-11e9-9ec2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "8d6584dc-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-3346"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47162"
      }
    ],
    "trust": 1.7055555500000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d76270f-463f-11e9-9ec2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "8d6584dc-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-3346"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:35:38.194000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Invensys Operations Management Security Alart",
        "trust": 1.6,
        "url": "http://iom.invensys.com/EN/Pages/IOM_CyberSecurityUpdates.aspx"
      },
      {
        "title": "Cyber Security Updates",
        "trust": 0.8,
        "url": "http://iom.invensys.com/EN/pdfLibrary/SecurityAlert_Invensys_SecurityAlert-LFSEC00000051_12-10.pdf"
      },
      {
        "title": "Wonderware \u65e5\u672c\u306e\u30d1\u30fc\u30c8\u30ca\u30fc ",
        "trust": 0.8,
        "url": "http://global.wonderware.com/JP/Pages/JpPartnersSI.aspx"
      },
      {
        "title": "Wonderware Top Page",
        "trust": 0.8,
        "url": "http://global.wonderware.com/JP/"
      },
      {
        "title": "WonderwareInBatchSoftware",
        "trust": 0.8,
        "url": "http://global.wonderware.com/EN/Pages/WonderwareInBatchSoftware.aspx"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002872"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002656"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-47162"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002872"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4557"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.9,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-10-348-01.pdf"
      },
      {
        "trust": 3.9,
        "url": "http://www.kb.cert.org/vuls/id/647928"
      },
      {
        "trust": 3.3,
        "url": "http://secunia.com/advisories/42528"
      },
      {
        "trust": 2.9,
        "url": "http://iom.invensys.com/en/pages/iom_cybersecurityupdates.aspx"
      },
      {
        "trust": 2.8,
        "url": "http://aluigi.org/adv/inbatch_1-adv.txt"
      },
      {
        "trust": 2.0,
        "url": "http://iom.invensys.com/en/pdflibrary/securityalert_invensys_securityalert-lfsec00000051_12-10.pdf"
      },
      {
        "trust": 2.0,
        "url": "http://www.exploit-db.com/exploits/15707"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2010/3244"
      },
      {
        "trust": 1.1,
        "url": "http://global.wonderware.com/en/pages/wonderwareinbatchsoftware.aspx"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4557"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4557"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu647928"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/42528http"
      },
      {
        "trust": 0.3,
        "url": "http://www.raima.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/evm/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/42528/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/42528/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/vim/"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/inbatch_1-adv.txt"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42528"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#647928"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-3346"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47162"
      },
      {
        "db": "BID",
        "id": "45245"
      },
      {
        "db": "BID",
        "id": "78742"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002872"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002656"
      },
      {
        "db": "PACKETSTORM",
        "id": "96969"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201012-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4557"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "7d76270f-463f-11e9-9ec2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "8d6584dc-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CERT/CC",
        "id": "VU#647928"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-3346"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47162"
      },
      {
        "db": "BID",
        "id": "45245"
      },
      {
        "db": "BID",
        "id": "78742"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002872"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-002656"
      },
      {
        "db": "PACKETSTORM",
        "id": "96969"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201012-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4557"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-12-23T00:00:00",
        "db": "IVD",
        "id": "7d76270f-463f-11e9-9ec2-000c29342cb1"
      },
      {
        "date": "2010-12-23T00:00:00",
        "db": "IVD",
        "id": "8d6584dc-2355-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2010-12-15T00:00:00",
        "db": "CERT/CC",
        "id": "VU#647928"
      },
      {
        "date": "2010-12-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2010-3346"
      },
      {
        "date": "2010-12-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-47162"
      },
      {
        "date": "2010-12-07T00:00:00",
        "db": "BID",
        "id": "45245"
      },
      {
        "date": "2010-12-17T00:00:00",
        "db": "BID",
        "id": "78742"
      },
      {
        "date": "2011-12-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-002872"
      },
      {
        "date": "2011-01-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-002656"
      },
      {
        "date": "2010-12-25T08:43:21",
        "db": "PACKETSTORM",
        "id": "96969"
      },
      {
        "date": "2010-12-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201012-254"
      },
      {
        "date": "2010-12-17T19:00:26.293000",
        "db": "NVD",
        "id": "CVE-2010-4557"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-12-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#647928"
      },
      {
        "date": "2010-12-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2010-3346"
      },
      {
        "date": "2013-08-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-47162"
      },
      {
        "date": "2010-12-15T13:34:00",
        "db": "BID",
        "id": "45245"
      },
      {
        "date": "2010-12-17T00:00:00",
        "db": "BID",
        "id": "78742"
      },
      {
        "date": "2011-12-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-002872"
      },
      {
        "date": "2011-01-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-002656"
      },
      {
        "date": "2010-12-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201012-254"
      },
      {
        "date": "2024-11-21T01:21:12.540000",
        "db": "NVD",
        "id": "CVE-2010-4557"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "45245"
      },
      {
        "db": "BID",
        "id": "78742"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Invensys Wonderware InBatch lm_tcp Service Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "7d76270f-463f-11e9-9ec2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "8d6584dc-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-3346"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201012-254"
      }
    ],
    "trust": 1.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "7d76270f-463f-11e9-9ec2-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "8d6584dc-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201012-254"
      }
    ],
    "trust": 1.0
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…