var-201109-0182
Vulnerability from variot
RnaUtility.dll in RsvcHost.exe 2.30.0.23 in Rockwell RSLogix 19 and earlier allows remote attackers to cause a denial of service (crash) via a crafted rna packet with a long string to TCP port 4446 that triggers (1) "a memset zero overflow" or (2) an out-of-bounds read, related to improper handling of a 32-bit size field. RSLinx Classic connects RSLogix and RSNetWorx products to Rockwell Automation networks and devices, and is also an OPC server. RsvcHost.exe and RNADiagReceiver.exe listen to 4446 and other ports. Rockwell RSLogix is a programming software for industrial automation. An attacker could exploit this vulnerability to execute arbitrary code for an attack. RSLogix is prone to a denial-of-service vulnerability. Attackers can exploit this issue to crash the application, denying service to legitimate users. RSLogix 5000 is vulnerable. Other versions may also be affected. A buffer overflow vulnerability exists in RnaUtility.dll in RsvcHost.exe version 2.30.0.23 of Rockwell RSLogix 19 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201109-0182",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "rslogix",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "19"
},
{
"model": "rslogix",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "19"
},
{
"model": "automation rslogix/factorytalk",
"scope": "lte",
"trust": 0.6,
"vendor": "rockwell",
"version": "\u003c=19"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwall",
"version": "5000"
},
{
"model": "automation rockwell rslogix",
"scope": "lte",
"trust": 0.6,
"vendor": "rockwell",
"version": "\u003c=19"
},
{
"model": "rslogix",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "19"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "rslogix",
"version": "*"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwall",
"version": "500019"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwall",
"version": "500018"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwall",
"version": "500017"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwall",
"version": "50000"
},
{
"model": "automation factorytalk cpr9-sr4",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9-sr3",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9-sr2",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9-sr1",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwall",
"version": "0"
},
{
"model": "automation",
"scope": "eq",
"trust": 0.2,
"vendor": "rockwell",
"version": "*"
},
{
"model": "rslogix",
"scope": "lte",
"trust": 0.2,
"vendor": "rockwell",
"version": "\u003c=19"
}
],
"sources": [
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"db": "BID",
"id": "49608"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-262"
},
{
"db": "NVD",
"id": "CVE-2011-3489"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:rockwellautomation:rslogix",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Luigi Auriemma",
"sources": [
{
"db": "BID",
"id": "49608"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-186"
}
],
"trust": 0.9
},
"cve": "CVE-2011-3489",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2011-3489",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "a50faadc-2354-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.3 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-51434",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2011-3489",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2011-3489",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201109-262",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-51434",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-51434"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-262"
},
{
"db": "NVD",
"id": "CVE-2011-3489"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "RnaUtility.dll in RsvcHost.exe 2.30.0.23 in Rockwell RSLogix 19 and earlier allows remote attackers to cause a denial of service (crash) via a crafted rna packet with a long string to TCP port 4446 that triggers (1) \"a memset zero overflow\" or (2) an out-of-bounds read, related to improper handling of a 32-bit size field. RSLinx Classic connects RSLogix and RSNetWorx products to Rockwell Automation networks and devices, and is also an OPC server. RsvcHost.exe and RNADiagReceiver.exe listen to 4446 and other ports. Rockwell RSLogix is a programming software for industrial automation. An attacker could exploit this vulnerability to execute arbitrary code for an attack. RSLogix is prone to a denial-of-service vulnerability. \nAttackers can exploit this issue to crash the application, denying service to legitimate users. \nRSLogix 5000 is vulnerable. Other versions may also be affected. A buffer overflow vulnerability exists in RnaUtility.dll in RsvcHost.exe version 2.30.0.23 of Rockwell RSLogix 19 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-3489"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"db": "BID",
"id": "49608"
},
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-51434"
}
],
"trust": 4.14
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-51434",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-51434"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2011-3489",
"trust": 3.8
},
{
"db": "BID",
"id": "49608",
"trust": 2.6
},
{
"db": "CNNVD",
"id": "CNNVD-201109-262",
"trust": 1.1
},
{
"db": "SREASON",
"id": "8383",
"trust": 1.1
},
{
"db": "CNVD",
"id": "CNVD-2011-3724",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2011-3647",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2011-3683",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252",
"trust": 0.8
},
{
"db": "EXPLOIT-DB",
"id": "17843",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201109-186",
"trust": 0.6
},
{
"db": "ICS CERT ALERT",
"id": "ICS-ALERT-11-256-05A",
"trust": 0.3
},
{
"db": "ICS CERT",
"id": "ICSA-11-273-03",
"trust": 0.3
},
{
"db": "IVD",
"id": "A50FAADC-2354-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "IVD",
"id": "E84A6D20-1F88-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "IVD",
"id": "D48E7D58-1F88-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-51434",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"db": "VULHUB",
"id": "VHN-51434"
},
{
"db": "BID",
"id": "49608"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-262"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-186"
},
{
"db": "NVD",
"id": "CVE-2011-3489"
}
]
},
"id": "VAR-201109-0182",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"db": "VULHUB",
"id": "VHN-51434"
}
],
"trust": 3.333333325
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 2.4
}
],
"sources": [
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "CNVD",
"id": "CNVD-2011-3683"
}
]
},
"last_update_date": "2024-11-23T23:03:00.134000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.rockwellautomation.com/"
},
{
"title": "Design \u0026 Configuration",
"trust": 0.8,
"url": "http://www.rockwellautomation.com/rockwellsoftware/design/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-51434"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"db": "NVD",
"id": "CVE-2011-3489"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.2,
"url": "http://aluigi.altervista.org/adv/rslogix_1-adv.txt"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/49608"
},
{
"trust": 1.1,
"url": "http://securityreason.com/securityalert/8383"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69808"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3489"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3489"
},
{
"trust": 0.6,
"url": "http://www.exploit-db.com/exploits/17843/"
},
{
"trust": 0.3,
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/456144"
},
{
"trust": 0.3,
"url": "http://www.rockwellautomation.com/rockwellsoftware/design/rslogix5000/"
},
{
"trust": 0.3,
"url": "http://aluigi.org/poc/rslogix_1.zip"
},
{
"trust": 0.3,
"url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-11-256-05a.pdf"
},
{
"trust": 0.3,
"url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-273-03.pdf"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"db": "VULHUB",
"id": "VHN-51434"
},
{
"db": "BID",
"id": "49608"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-262"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-186"
},
{
"db": "NVD",
"id": "CVE-2011-3489"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"db": "VULHUB",
"id": "VHN-51434"
},
{
"db": "BID",
"id": "49608"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-262"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-186"
},
{
"db": "NVD",
"id": "CVE-2011-3489"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-09-20T00:00:00",
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"date": "2011-09-14T00:00:00",
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"date": "2011-09-15T00:00:00",
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"date": "2011-09-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"date": "2011-09-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"date": "2011-09-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"date": "2011-09-16T00:00:00",
"db": "VULHUB",
"id": "VHN-51434"
},
{
"date": "2011-09-13T00:00:00",
"db": "BID",
"id": "49608"
},
{
"date": "2011-09-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"date": "2011-09-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201109-262"
},
{
"date": "1900-01-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201109-186"
},
{
"date": "2011-09-16T14:28:12.060000",
"db": "NVD",
"id": "CVE-2011-3489"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-09-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"date": "2011-09-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"date": "2011-09-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"date": "2017-08-29T00:00:00",
"db": "VULHUB",
"id": "VHN-51434"
},
{
"date": "2011-09-30T22:50:00",
"db": "BID",
"id": "49608"
},
{
"date": "2011-09-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"date": "2011-09-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201109-262"
},
{
"date": "2011-09-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201109-186"
},
{
"date": "2024-11-21T01:30:34.880000",
"db": "NVD",
"id": "CVE-2011-3489"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201109-262"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-186"
}
],
"trust": 1.2
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "RSLogix Remote Denial of Service Vulnerability",
"sources": [
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "BID",
"id": "49608"
}
],
"trust": 1.1
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow",
"sources": [
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-262"
}
],
"trust": 1.0
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.