var-201705-3750
Vulnerability from variot
All versions of VAMPSET software produced by Schneider Electric, prior to V2.2.189, are susceptible to a memory corruption vulnerability when a corrupted vf2 file is used. This vulnerability causes the software to halt or not start when trying to open the corrupted file. This vulnerability occurs when fill settings are intentionally malformed and is opened in a standalone state, without connection to a protection relay. This attack is not considered to be remotely exploitable. This vulnerability has no effect on the operation of the protection relay to which VAMPSET is connected. As Windows operating system remains operational and VAMPSET responds, it is able to be shut down through its normal closing protocol. Schneider Electric VAMPSET Software contains a buffer error vulnerability.Denial of service (DoS) May be in a state. Schneider Electric VAMPSET is a software company from Schneider Electric, France, deployed in the energy industry to configure and maintain multiple relays and arc monitors. An attacker could exploit this vulnerability to execute arbitrary code in the context of the user running the affected application. Lead to a denial of service condition. Failed exploit attempts will likely cause denial-of-service conditions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201705-3750",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vampset",
"scope": "lte",
"trust": 1.0,
"vendor": "schneider electric",
"version": "2.2.185"
},
{
"model": "vampset",
"scope": "lt",
"trust": 0.8,
"vendor": "schneider electric",
"version": "2.2.189"
},
{
"model": "electric vampset",
"scope": "eq",
"trust": 0.6,
"vendor": "schneider",
"version": "v2.2.189"
},
{
"model": "electric vampset",
"scope": "eq",
"trust": 0.6,
"vendor": "schneider",
"version": "2.2.145"
},
{
"model": "electric vampset",
"scope": "eq",
"trust": 0.6,
"vendor": "schneider",
"version": "2.2.136"
},
{
"model": "vampset",
"scope": "eq",
"trust": 0.6,
"vendor": "schneider electric",
"version": "2.2.185"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "vampset",
"version": "*"
},
{
"model": "vampset",
"scope": "eq",
"trust": 0.3,
"vendor": "schneider electric",
"version": "2.2.145"
},
{
"model": "vampset",
"scope": "eq",
"trust": 0.3,
"vendor": "schneider electric",
"version": "2.2.136"
},
{
"model": "vampset",
"scope": "ne",
"trust": 0.3,
"vendor": "schneider electric",
"version": "2.2.189"
}
],
"sources": [
{
"db": "IVD",
"id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
},
{
"db": "IVD",
"id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
},
{
"db": "CNVD",
"id": "CNVD-2017-06423"
},
{
"db": "CNVD",
"id": "CNVD-2017-05641"
},
{
"db": "BID",
"id": "97124"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003998"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-901"
},
{
"db": "NVD",
"id": "CVE-2017-7967"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:schneider_electric:vampset",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-003998"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Kushal Arvind Shah from Fortinet\u0027s Fortiguard Labs.",
"sources": [
{
"db": "BID",
"id": "97124"
}
],
"trust": 0.3
},
"cve": "CVE-2017-7967",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2017-7967",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 5.7,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.1,
"id": "CNVD-2017-06423",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.4,
"id": "CNVD-2017-05641",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 5.7,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.1,
"id": "89ad9c93-eb8e-463a-8758-eb5258ca9069",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.4,
"id": "753ccabe-b440-4a3a-a6ad-9bb292467d05",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "VHN-116170",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.8,
"id": "CVE-2017-7967",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-7967",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2017-7967",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2017-06423",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2017-05641",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201704-901",
"trust": 0.6,
"value": "LOW"
},
{
"author": "IVD",
"id": "89ad9c93-eb8e-463a-8758-eb5258ca9069",
"trust": 0.2,
"value": "LOW"
},
{
"author": "IVD",
"id": "753ccabe-b440-4a3a-a6ad-9bb292467d05",
"trust": 0.2,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-116170",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
},
{
"db": "IVD",
"id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
},
{
"db": "CNVD",
"id": "CNVD-2017-06423"
},
{
"db": "CNVD",
"id": "CNVD-2017-05641"
},
{
"db": "VULHUB",
"id": "VHN-116170"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003998"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-901"
},
{
"db": "NVD",
"id": "CVE-2017-7967"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "All versions of VAMPSET software produced by Schneider Electric, prior to V2.2.189, are susceptible to a memory corruption vulnerability when a corrupted vf2 file is used. This vulnerability causes the software to halt or not start when trying to open the corrupted file. This vulnerability occurs when fill settings are intentionally malformed and is opened in a standalone state, without connection to a protection relay. This attack is not considered to be remotely exploitable. This vulnerability has no effect on the operation of the protection relay to which VAMPSET is connected. As Windows operating system remains operational and VAMPSET responds, it is able to be shut down through its normal closing protocol. Schneider Electric VAMPSET Software contains a buffer error vulnerability.Denial of service (DoS) May be in a state. Schneider Electric VAMPSET is a software company from Schneider Electric, France, deployed in the energy industry to configure and maintain multiple relays and arc monitors. An attacker could exploit this vulnerability to execute arbitrary code in the context of the user running the affected application. Lead to a denial of service condition. Failed exploit attempts will likely cause denial-of-service conditions",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-7967"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003998"
},
{
"db": "CNVD",
"id": "CNVD-2017-06423"
},
{
"db": "CNVD",
"id": "CNVD-2017-05641"
},
{
"db": "BID",
"id": "97124"
},
{
"db": "IVD",
"id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
},
{
"db": "IVD",
"id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
},
{
"db": "VULHUB",
"id": "VHN-116170"
}
],
"trust": 3.42
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-7967",
"trust": 3.8
},
{
"db": "SCHNEIDER",
"id": "SEVD-2017-061-01",
"trust": 2.6
},
{
"db": "BID",
"id": "97124",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201704-901",
"trust": 1.1
},
{
"db": "CNVD",
"id": "CNVD-2017-06423",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2017-05641",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003998",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-17-136-04",
"trust": 0.3
},
{
"db": "IVD",
"id": "89AD9C93-EB8E-463A-8758-EB5258CA9069",
"trust": 0.2
},
{
"db": "IVD",
"id": "753CCABE-B440-4A3A-A6AD-9BB292467D05",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-116170",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
},
{
"db": "IVD",
"id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
},
{
"db": "CNVD",
"id": "CNVD-2017-06423"
},
{
"db": "CNVD",
"id": "CNVD-2017-05641"
},
{
"db": "VULHUB",
"id": "VHN-116170"
},
{
"db": "BID",
"id": "97124"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003998"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-901"
},
{
"db": "NVD",
"id": "CVE-2017-7967"
}
]
},
"id": "VAR-201705-3750",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
},
{
"db": "IVD",
"id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
},
{
"db": "CNVD",
"id": "CNVD-2017-06423"
},
{
"db": "CNVD",
"id": "CNVD-2017-05641"
},
{
"db": "VULHUB",
"id": "VHN-116170"
}
],
"trust": 2.521428565
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.6
}
],
"sources": [
{
"db": "IVD",
"id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
},
{
"db": "IVD",
"id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
},
{
"db": "CNVD",
"id": "CNVD-2017-06423"
},
{
"db": "CNVD",
"id": "CNVD-2017-05641"
}
]
},
"last_update_date": "2024-11-23T23:09:02.853000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SEVD-2017-061-01",
"trust": 0.8,
"url": "http://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Id=7289882651\u0026p_File_Name=SEVD-2017-061-01+VAMPSET.pdf\u0026p_Reference=SEVD-2017-061-01"
},
{
"title": "Schneider Electric VAMPSET Memory Corruption Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/93552"
},
{
"title": "Schneider Electric VAMPSET Patch for Local Memory Corruption Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/92942"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-06423"
},
{
"db": "CNVD",
"id": "CNVD-2017-05641"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003998"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-116170"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003998"
},
{
"db": "NVD",
"id": "CVE-2017-7967"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.schneider-electric.com/en/download/document/sevd-2017-061-01/"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/97124"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7967"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7967"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/97124/info"
},
{
"trust": 0.3,
"url": "http://www.schneider-electric.com/products/ww/en/"
},
{
"trust": 0.3,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-136-04"
},
{
"trust": 0.3,
"url": "http://download.schneider-electric.com/files?p_endoctype=technical+leaflet\u0026p_file_id=6595887732\u0026p_file_name=sevd-2017-061-01+vampset.pdf\u0026p_reference=sevd-2017-061-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-06423"
},
{
"db": "CNVD",
"id": "CNVD-2017-05641"
},
{
"db": "VULHUB",
"id": "VHN-116170"
},
{
"db": "BID",
"id": "97124"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003998"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-901"
},
{
"db": "NVD",
"id": "CVE-2017-7967"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
},
{
"db": "IVD",
"id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
},
{
"db": "CNVD",
"id": "CNVD-2017-06423"
},
{
"db": "CNVD",
"id": "CNVD-2017-05641"
},
{
"db": "VULHUB",
"id": "VHN-116170"
},
{
"db": "BID",
"id": "97124"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003998"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-901"
},
{
"db": "NVD",
"id": "CVE-2017-7967"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-05-13T00:00:00",
"db": "IVD",
"id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
},
{
"date": "2017-04-29T00:00:00",
"db": "IVD",
"id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
},
{
"date": "2017-05-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-06423"
},
{
"date": "2017-04-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05641"
},
{
"date": "2017-05-09T00:00:00",
"db": "VULHUB",
"id": "VHN-116170"
},
{
"date": "2017-03-02T00:00:00",
"db": "BID",
"id": "97124"
},
{
"date": "2017-06-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-003998"
},
{
"date": "2017-04-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-901"
},
{
"date": "2017-05-09T17:29:00.213000",
"db": "NVD",
"id": "CVE-2017-7967"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-05-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-06423"
},
{
"date": "2017-04-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05641"
},
{
"date": "2017-05-23T00:00:00",
"db": "VULHUB",
"id": "VHN-116170"
},
{
"date": "2017-05-23T16:26:00",
"db": "BID",
"id": "97124"
},
{
"date": "2017-06-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-003998"
},
{
"date": "2017-05-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-901"
},
{
"date": "2024-11-21T03:33:03.883000",
"db": "NVD",
"id": "CVE-2017-7967"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "97124"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-901"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Schneider Electric VAMPSET Local Memory Corruption Vulnerability",
"sources": [
{
"db": "IVD",
"id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
},
{
"db": "CNVD",
"id": "CNVD-2017-05641"
},
{
"db": "BID",
"id": "97124"
}
],
"trust": 1.1
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow",
"sources": [
{
"db": "IVD",
"id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
},
{
"db": "IVD",
"id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-901"
}
],
"trust": 1.0
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.