var-201201-0028
Vulnerability from variot
Siemens Automation License Manager (ALM) 4.0 through 5.1+SP1+Upd1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted content in a (1) get_target_ocx_param or (2) send_target_ocx_param command. The Siemens Automation License Manager is the authorization manager program for Siemens software. Some long fields can be used to trigger exceptions: The exception unknown software exception (0xc0000417) occurred in the application at location 0x????????. This exception is due to some functions using wcscpy_s to copy the value provided by the client to Caused by the stack buffer. Remote attackers can exploit these issues to execute arbitrary code in the context of the application or cause denial-of-service conditions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201201-0028", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "automation license manager", "scope": "eq", "trust": 1.8, "vendor": "siemens", "version": "500.0.1221" }, { "model": "automation license manager", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "5.1" }, { "model": "automation license manager", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "4.0 to 5.1+sp1+upd1" }, { "model": "automation license manager", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5.1" }, { "model": "automation license manager", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "501.1.102.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "automation license manager", "version": "*" } ], "sources": [ { "db": "IVD", "id": "3cc922d2-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5099" }, { "db": "CNVD", "id": "CNVD-2011-5101" }, { "db": "CNVD", "id": "CNVD-2011-5097" }, { "db": "BID", "id": "50830" }, { "db": "JVNDB", "id": "JVNDB-2012-001030" }, { "db": "CNNVD", "id": "CNNVD-201201-081" }, { "db": "NVD", "id": "CVE-2011-4531" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:siemens:automation_license_manager", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001030" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma", "sources": [ { "db": "BID", "id": "50830" }, { "db": "CNNVD", "id": "CNNVD-201111-482" } ], "trust": 0.9 }, "cve": "CVE-2011-4531", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2011-4531", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "3cc922d2-2354-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-52476", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-4531", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-4531", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201201-081", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "3cc922d2-2354-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-52476", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "3cc922d2-2354-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-52476" }, { "db": "JVNDB", "id": "JVNDB-2012-001030" }, { "db": "CNNVD", "id": "CNNVD-201201-081" }, { "db": "NVD", "id": "CVE-2011-4531" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens Automation License Manager (ALM) 4.0 through 5.1+SP1+Upd1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted content in a (1) get_target_ocx_param or (2) send_target_ocx_param command. The Siemens Automation License Manager is the authorization manager program for Siemens software. Some long fields can be used to trigger exceptions: The exception unknown software exception (0xc0000417) occurred in the application at location 0x????????. This exception is due to some functions using wcscpy_s to copy the value provided by the client to Caused by the stack buffer. \nRemote attackers can exploit these issues to execute arbitrary code in the context of the application or cause denial-of-service conditions", "sources": [ { "db": "NVD", "id": "CVE-2011-4531" }, { "db": "JVNDB", "id": "JVNDB-2012-001030" }, { "db": "CNVD", "id": "CNVD-2011-5099" }, { "db": "CNVD", "id": "CNVD-2011-5101" }, { "db": "CNVD", "id": "CNVD-2011-5097" }, { "db": "BID", "id": "50830" }, { "db": "IVD", "id": "3cc922d2-2354-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-52476" } ], "trust": 3.78 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-52476", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-52476" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-4531", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-11-361-01", "trust": 2.8 }, { "db": "BID", "id": "50830", "trust": 2.7 }, { "db": "CNNVD", "id": "CNNVD-201201-081", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2012-001030", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2011-5099", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2011-5101", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2011-5097", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201111-482", "trust": 0.6 }, { "db": "IVD", "id": "3CC922D2-2354-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "EXPLOIT-DB", "id": "18165", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-52476", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "3cc922d2-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5099" }, { "db": "CNVD", "id": "CNVD-2011-5101" }, { "db": "CNVD", "id": "CNVD-2011-5097" }, { "db": "VULHUB", "id": "VHN-52476" }, { "db": "BID", "id": "50830" }, { "db": "JVNDB", "id": "JVNDB-2012-001030" }, { "db": "CNNVD", "id": "CNNVD-201201-081" }, { "db": "CNNVD", "id": "CNNVD-201111-482" }, { "db": "NVD", "id": "CVE-2011-4531" } ] }, "id": "VAR-201201-0028", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "3cc922d2-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5099" }, { "db": "CNVD", "id": "CNVD-2011-5101" }, { "db": "CNVD", "id": "CNVD-2011-5097" }, { "db": "VULHUB", "id": "VHN-52476" } ], "trust": 2.7293103700000003 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 2.0 } ], "sources": [ { "db": "IVD", "id": "3cc922d2-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5099" }, { "db": "CNVD", "id": "CNVD-2011-5101" }, { "db": "CNVD", "id": "CNVD-2011-5097" } ] }, "last_update_date": "2024-11-23T22:27:34.532000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "57252401", "trust": 0.8, "url": "http://support.automation.siemens.com/WW/llisapi.dll/57252401?func=ll\u0026objId=57252401\u0026objAction=csView\u0026nodeid0=17323948\u0026lang=en\u0026siteid=cseus\u0026aktprim=0\u0026extranet=standard\u0026viewreg=WW\u0026load=content\\" }, { "title": "114358", "trust": 0.8, "url": "http://support.automation.siemens.com/WW/llisapi.dll?func=cslib.csinfo\u0026lang=en\u0026objid=114358\u0026caller=view" }, { "title": "\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u30d1\u30fc\u30c8\u30ca\u30fc", "trust": 0.8, "url": "http://www.automation.siemens.com/automation/jp/ja/solutionpartner/pages/default.aspx" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.siemens.com/entry/jp/ja/" }, { "title": "Siemens Automation License Manager denial of service vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/72712" }, { "title": "Patch for Siemens Automation License Manager Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/72722" }, { "title": "ALMv5_1_1_3", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42332" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5101" }, { "db": "CNVD", "id": "CNVD-2011-5097" }, { "db": "JVNDB", "id": "JVNDB-2012-001030" }, { "db": "CNNVD", "id": "CNNVD-201201-081" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-52476" }, { "db": "JVNDB", "id": "JVNDB-2012-001030" }, { "db": "NVD", "id": "CVE-2011-4531" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "http://aluigi.altervista.org/adv/almsrvx_1-adv.txt" }, { "trust": 2.8, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-361-01.pdf" }, { "trust": 1.7, "url": "http://support.automation.siemens.com/ww/view/en/114358" }, { "trust": 1.6, "url": "http://support.automation.siemens.com/ww/llisapi.dll/57252401?func=ll\u0026objid=57252401\u0026objaction=csview\u0026nodeid0=17323948\u0026lang=en\u0026siteid=cseus\u0026aktprim=0\u0026extranet=standard\u0026viewreg=ww\u0026load=content" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4531" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4531" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/50830" }, { "trust": 0.3, "url": "http://support.automation.siemens.com/ww/llisapi.dll?func=cslib.csinfo\u0026lang=en\u0026siteid=cseus\u0026aktprim=0\u0026extranet=standard\u0026viewreg=ww\u0026objid=17323948\u0026tree" }, { "trust": 0.3, "url": "/archive/1/520660" }, { "trust": 0.1, "url": "http://support.automation.siemens.com/ww/llisapi.dll/57252401?func=ll\u0026amp;objid=57252401\u0026amp;objaction=csview\u0026amp;nodeid0=17323948\u0026amp;lang=en\u0026amp;siteid=cseus\u0026amp;aktprim=0\u0026amp;extranet=standard\u0026amp;viewreg=ww\u0026amp;load=content" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5099" }, { "db": "CNVD", "id": "CNVD-2011-5101" }, { "db": "VULHUB", "id": "VHN-52476" }, { "db": "BID", "id": "50830" }, { "db": "JVNDB", "id": "JVNDB-2012-001030" }, { "db": "CNNVD", "id": "CNNVD-201201-081" }, { "db": "CNNVD", "id": "CNNVD-201111-482" }, { "db": "NVD", "id": "CVE-2011-4531" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "3cc922d2-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5099" }, { "db": "CNVD", "id": "CNVD-2011-5101" }, { "db": "CNVD", "id": "CNVD-2011-5097" }, { "db": "VULHUB", "id": "VHN-52476" }, { "db": "BID", "id": "50830" }, { "db": "JVNDB", "id": "JVNDB-2012-001030" }, { "db": "CNNVD", "id": "CNNVD-201201-081" }, { "db": "CNNVD", "id": "CNNVD-201111-482" }, { "db": "NVD", "id": "CVE-2011-4531" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-01-11T00:00:00", "db": "IVD", "id": "3cc922d2-2354-11e6-abef-000c29c66e3d" }, { "date": "2011-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2011-5099" }, { "date": "2011-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2011-5101" }, { "date": "2011-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2011-5097" }, { "date": "2012-01-08T00:00:00", "db": "VULHUB", "id": "VHN-52476" }, { "date": "2011-11-28T00:00:00", "db": "BID", "id": "50830" }, { "date": "2012-01-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001030" }, { "date": "2012-01-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-081" }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201111-482" }, { "date": "2012-01-08T20:55:01.280000", "db": "NVD", "id": "CVE-2011-4531" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2011-5099" }, { "date": "2016-03-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-5101" }, { "date": "2016-03-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-5097" }, { "date": "2012-01-09T00:00:00", "db": "VULHUB", "id": "VHN-52476" }, { "date": "2012-01-04T00:20:00", "db": "BID", "id": "50830" }, { "date": "2012-01-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001030" }, { "date": "2012-01-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-081" }, { "date": "2011-11-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201111-482" }, { "date": "2024-11-21T01:32:29.357000", "db": "NVD", "id": "CVE-2011-4531" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201201-081" }, { "db": "CNNVD", "id": "CNNVD-201111-482" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens Automation License Manager Buffer Overflow and Denial of Service Vulnerabilities", "sources": [ { "db": "BID", "id": "50830" }, { "db": "CNNVD", "id": "CNNVD-201111-482" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation", "sources": [ { "db": "IVD", "id": "3cc922d2-2354-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201201-081" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.