ID

VAR-201206-0183


CVE

CVE-2012-3815


TITLE

Sielco Sistemi Winlog Lite Buffer Overflow Vulnerability

Trust: 1.1

sources: IVD: 287fd96c-1f65-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-3047 // BID: 53811

DESCRIPTION

Buffer overflow in RunTime.exe in Sielco Sistemi Winlog Pro SCADA before 2.07.18 and Winlog Lite SCADA before 2.07.18 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 46824. NOTE: some of these details are obtained from third party information. SIELCO SISTEMI Winlog is an application for data acquisition and remote control of SCADA HMI monitoring software. There is a security hole in Winlog Pro/lite. Winlog Pro/lite has an input validation error. Unauthorized users can send special requests to the TCP 46824 port to access the read system files. Winlog Lite is prone to a remote buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Winlog Packet Processing Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA49395 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49395/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49395 RELEASE DATE: 2012-06-06 DISCUSS ADVISORY: http://secunia.com/advisories/49395/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49395/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49395 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: m1k3 has discovered a vulnerability in Winlog, which can be exploited by malicious people to compromise a vulnerable system. Successful exploitation allows execution of arbitrary code, but requires a project to be configured for TCP server mode (not by default). The vulnerability is confirmed in version 2.07.14. Other versions may also be affected. SOLUTION: Restrict access to trusted hosts only. PROVIDED AND/OR DISCOVERED BY: m1k3 ORIGINAL ADVISORY: http://www.s3cur1ty.de/m1adv2012-001 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 5.58

sources: NVD: CVE-2012-3815 // JVNDB: JVNDB-2012-002929 // CNVD: CNVD-2012-4102 // CNVD: CNVD-2012-3047 // CNVD: CNVD-2012-4099 // CNVD: CNVD-2012-4101 // CNVD: CNVD-2012-4100 // BID: 53811 // IVD: b3d76da8-2353-11e6-abef-000c29c66e3d // IVD: 52a26e38-1f5d-11e6-abef-000c29c66e3d // IVD: 2ccb7b82-1f5d-11e6-abef-000c29c66e3d // IVD: 2e18ef1a-1f5d-11e6-abef-000c29c66e3d // IVD: 287fd96c-1f65-11e6-abef-000c29c66e3d // PACKETSTORM: 113312

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 4.0

sources: IVD: b3d76da8-2353-11e6-abef-000c29c66e3d // IVD: 52a26e38-1f5d-11e6-abef-000c29c66e3d // IVD: 2ccb7b82-1f5d-11e6-abef-000c29c66e3d // IVD: 2e18ef1a-1f5d-11e6-abef-000c29c66e3d // IVD: 287fd96c-1f65-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-4102 // CNVD: CNVD-2012-3047 // CNVD: CNVD-2012-4099 // CNVD: CNVD-2012-4101 // CNVD: CNVD-2012-4100

AFFECTED PRODUCTS

vendor:sielcomodel:sistemi winlog pro scadascope:ltversion:2.07.1

Trust: 2.4

vendor:sielcomodel:sistemi winlog lite scadascope:ltversion:2.07.18

Trust: 2.4

vendor:sielcosistemimodel:winlog proscope:eqversion:2.07.09

Trust: 1.6

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.14

Trust: 1.6

vendor:sielcosistemimodel:winlog proscope:eqversion:2.07.08

Trust: 1.6

vendor:sielcosistemimodel:winlog proscope:eqversion:2.07.11

Trust: 1.6

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.03

Trust: 1.6

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.10

Trust: 1.6

vendor:sielcosistemimodel:winlog proscope:eqversion:2.07.01

Trust: 1.6

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.00

Trust: 1.6

vendor:winlog litemodel: - scope:eqversion:2.06.00

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.03

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.04

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.06

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.09

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.10

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.12

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.13

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.14

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.18

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.21

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.24

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.25

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.28

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.40

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.46

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.50

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.60

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.73

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.06.86

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.07.00

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.07.01

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.07.08

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.07.09

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:2.07.11

Trust: 1.0

vendor:winlog litemodel: - scope:eqversion:*

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.00

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.03

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.04

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.06

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.09

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.10

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.12

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.13

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.14

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.18

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.21

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.24

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.25

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.28

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.40

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.46

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.50

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.60

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.73

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.06.86

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.07.00

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.07.01

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.07.08

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.07.09

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:2.07.11

Trust: 1.0

vendor:winlog promodel: - scope:eqversion:*

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.46

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.09

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.28

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.73

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:lteversion:2.07.14

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.86

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.06

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.07.09

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.07.08

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.07.01

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.14

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:lteversion:2.07.14

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.13

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.60

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.10

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.86

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.24

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.50

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.13

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.60

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.24

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.50

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.25

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.40

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.21

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.12

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.04

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.07.00

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.25

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.00

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.40

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.18

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.03

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.12

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.21

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.04

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.07.00

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.46

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.09

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.73

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.07.11

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.28

Trust: 1.0

vendor:sielcosistemimodel:winlog proscope:eqversion:2.06.18

Trust: 1.0

vendor:sielcosistemimodel:winlog litescope:eqversion:2.06.06

Trust: 1.0

vendor:sielcomodel:sistemi winlog litescope:eqversion:2.07.14

Trust: 0.9

vendor:sielco sistemimodel:winlog litescope:lteversion:2.07.14

Trust: 0.8

vendor:sielco sistemimodel:winlog proscope:lteversion:2.07.14

Trust: 0.8

vendor:sielcosistemimodel:winlog proscope:eqversion:2.07.14

Trust: 0.6

vendor:sielcosistemimodel:winlog litescope:eqversion:2.07.14

Trust: 0.6

sources: IVD: b3d76da8-2353-11e6-abef-000c29c66e3d // IVD: 52a26e38-1f5d-11e6-abef-000c29c66e3d // IVD: 2ccb7b82-1f5d-11e6-abef-000c29c66e3d // IVD: 2e18ef1a-1f5d-11e6-abef-000c29c66e3d // IVD: 287fd96c-1f65-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-4102 // CNVD: CNVD-2012-3047 // CNVD: CNVD-2012-4099 // CNVD: CNVD-2012-4101 // CNVD: CNVD-2012-4100 // BID: 53811 // JVNDB: JVNDB-2012-002929 // CNNVD: CNNVD-201206-070 // NVD: CVE-2012-3815

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3815
value: HIGH

Trust: 1.0

NVD: CVE-2012-3815
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201206-070
value: CRITICAL

Trust: 0.6

IVD: b3d76da8-2353-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 52a26e38-1f5d-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 2ccb7b82-1f5d-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 2e18ef1a-1f5d-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 287fd96c-1f65-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2012-3815
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: b3d76da8-2353-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 52a26e38-1f5d-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 2ccb7b82-1f5d-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 2e18ef1a-1f5d-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 287fd96c-1f65-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: b3d76da8-2353-11e6-abef-000c29c66e3d // IVD: 52a26e38-1f5d-11e6-abef-000c29c66e3d // IVD: 2ccb7b82-1f5d-11e6-abef-000c29c66e3d // IVD: 2e18ef1a-1f5d-11e6-abef-000c29c66e3d // IVD: 287fd96c-1f65-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2012-002929 // CNNVD: CNNVD-201206-070 // NVD: CVE-2012-3815

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2012-002929 // NVD: CVE-2012-3815

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201206-070

TYPE

Buffer overflow

Trust: 1.6

sources: IVD: b3d76da8-2353-11e6-abef-000c29c66e3d // IVD: 52a26e38-1f5d-11e6-abef-000c29c66e3d // IVD: 2ccb7b82-1f5d-11e6-abef-000c29c66e3d // IVD: 2e18ef1a-1f5d-11e6-abef-000c29c66e3d // IVD: 287fd96c-1f65-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201206-070

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002929

PATCH

title:Winlog Pro SCADA and Winlog Lite SCADA 2.07.17url:http://www.sielcosistemi.com/en/news/index.html?id=69

Trust: 0.8

title:Winlog Pro SCADA and Winlog Lite SCADA 2.07.18url:http://www.sielcosistemi.com/en/news/index.html?id=70

Trust: 0.8

title:Top Pageurl:http://www.sielcosistemi.com/en/products/winlog_scada_hmi/index.html

Trust: 0.8

title:Sielco Sistemi Winlog Application Vulnerability (CNVD-2012-4102) patchurl:https://www.cnvd.org.cn/patchInfo/show/19521

Trust: 0.6

title:Patch for Sielco Sistemi Winlog Application Vulnerability (CNVD-2012-4099)url:https://www.cnvd.org.cn/patchInfo/show/19518

Trust: 0.6

title:Patch for Sielco Sistemi Winlog Application Vulnerability (CNVD-2012-4101)url:https://www.cnvd.org.cn/patchInfo/show/19520

Trust: 0.6

title:Patch for Sielco Sistemi Winlog Application Vulnerability (CNVD-2012-4100)url:https://www.cnvd.org.cn/patchInfo/show/19519

Trust: 0.6

sources: CNVD: CNVD-2012-4102 // CNVD: CNVD-2012-4099 // CNVD: CNVD-2012-4101 // CNVD: CNVD-2012-4100 // JVNDB: JVNDB-2012-002929

EXTERNAL IDS

db:NVDid:CVE-2012-3815

Trust: 6.1

db:ICS CERTid:ICSA-12-213-01

Trust: 4.5

db:BIDid:53811

Trust: 2.5

db:SECUNIAid:49395

Trust: 1.7

db:CNNVDid:CNNVD-201206-070

Trust: 1.6

db:SECTRACKid:1027128

Trust: 1.6

db:OSVDBid:82654

Trust: 1.6

db:CNVDid:CNVD-2012-4101

Trust: 0.8

db:CNVDid:CNVD-2012-4102

Trust: 0.8

db:CNVDid:CNVD-2012-4100

Trust: 0.8

db:CNVDid:CNVD-2012-4099

Trust: 0.8

db:CNVDid:CNVD-2012-3047

Trust: 0.8

db:JVNDBid:JVNDB-2012-002929

Trust: 0.8

db:BUGTRAQid:20120605 SIELCO SISTEMI WINLOG BUFFER OVERFLOW <= V2.07.14

Trust: 0.6

db:XFid:76060

Trust: 0.6

db:ICS CERT ALERTid:ICS-ALERT-12-166-01

Trust: 0.3

db:IVDid:B3D76DA8-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:52A26E38-1F5D-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:2CCB7B82-1F5D-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:2E18EF1A-1F5D-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:287FD96C-1F65-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:113312

Trust: 0.1

sources: IVD: b3d76da8-2353-11e6-abef-000c29c66e3d // IVD: 52a26e38-1f5d-11e6-abef-000c29c66e3d // IVD: 2ccb7b82-1f5d-11e6-abef-000c29c66e3d // IVD: 2e18ef1a-1f5d-11e6-abef-000c29c66e3d // IVD: 287fd96c-1f65-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-4102 // CNVD: CNVD-2012-3047 // CNVD: CNVD-2012-4099 // CNVD: CNVD-2012-4101 // CNVD: CNVD-2012-4100 // BID: 53811 // JVNDB: JVNDB-2012-002929 // PACKETSTORM: 113312 // CNNVD: CNNVD-201206-070 // NVD: CVE-2012-3815

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-213-01.pdf

Trust: 3.7

url:http://www.s3cur1ty.de/m1adv2012-001

Trust: 1.7

url:http://www.securityfocus.com/bid/53811

Trust: 1.6

url:http://www.osvdb.org/82654

Trust: 1.6

url:http://securitytracker.com/id?1027128

Trust: 1.6

url:http://secunia.com/advisories/49395

Trust: 1.6

url:http://archives.neohapsis.com/archives/bugtraq/2012-06/0009.html

Trust: 1.6

url:http://www.sielcosistemi.com/en/news/index.html?id=69

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/76060

Trust: 1.0

url:http://www.sielcosistemi.com/en/news/index.html?id=70

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3815

Trust: 0.8

url:http://ics-cert.us-cert.gov/advisories/icsa-12-213-01

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3815

Trust: 0.8

url:http://www.securityfocus.com/archive/1/522974

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/76060

Trust: 0.6

url:http://www.sielcosistemi.com/en/download/public/winlog_lite.html

Trust: 0.3

url:/archive/1/522974

Trust: 0.3

url:http://www.us-cert.gov/control_systems/pdf/ics-alert-12-166-01.pdf

Trust: 0.3

url:http://secunia.com/advisories/49395/#comments

Trust: 0.1

url:http://secunia.com/advisories/49395/

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=49395

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-4102 // CNVD: CNVD-2012-3047 // CNVD: CNVD-2012-4099 // CNVD: CNVD-2012-4101 // CNVD: CNVD-2012-4100 // BID: 53811 // JVNDB: JVNDB-2012-002929 // PACKETSTORM: 113312 // CNNVD: CNNVD-201206-070 // NVD: CVE-2012-3815

CREDITS

m1k3

Trust: 0.9

sources: BID: 53811 // CNNVD: CNNVD-201206-070

SOURCES

db:IVDid:b3d76da8-2353-11e6-abef-000c29c66e3d
db:IVDid:52a26e38-1f5d-11e6-abef-000c29c66e3d
db:IVDid:2ccb7b82-1f5d-11e6-abef-000c29c66e3d
db:IVDid:2e18ef1a-1f5d-11e6-abef-000c29c66e3d
db:IVDid:287fd96c-1f65-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-4102
db:CNVDid:CNVD-2012-3047
db:CNVDid:CNVD-2012-4099
db:CNVDid:CNVD-2012-4101
db:CNVDid:CNVD-2012-4100
db:BIDid:53811
db:JVNDBid:JVNDB-2012-002929
db:PACKETSTORMid:113312
db:CNNVDid:CNNVD-201206-070
db:NVDid:CVE-2012-3815

LAST UPDATE DATE

2025-04-11T22:49:27.167000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-4102date:2012-08-07T00:00:00
db:CNVDid:CNVD-2012-3047date:2012-06-08T00:00:00
db:CNVDid:CNVD-2012-4099date:2012-08-07T00:00:00
db:CNVDid:CNVD-2012-4101date:2012-08-07T00:00:00
db:CNVDid:CNVD-2012-4100date:2012-08-07T00:00:00
db:BIDid:53811date:2015-03-19T08:45:00
db:JVNDBid:JVNDB-2012-002929date:2013-06-26T00:00:00
db:CNNVDid:CNNVD-201206-070date:2012-06-28T00:00:00
db:NVDid:CVE-2012-3815date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:b3d76da8-2353-11e6-abef-000c29c66e3ddate:2012-08-07T00:00:00
db:IVDid:52a26e38-1f5d-11e6-abef-000c29c66e3ddate:2012-08-07T00:00:00
db:IVDid:2ccb7b82-1f5d-11e6-abef-000c29c66e3ddate:2012-08-07T00:00:00
db:IVDid:2e18ef1a-1f5d-11e6-abef-000c29c66e3ddate:2012-08-07T00:00:00
db:IVDid:287fd96c-1f65-11e6-abef-000c29c66e3ddate:2012-06-08T00:00:00
db:CNVDid:CNVD-2012-4102date:2012-08-07T00:00:00
db:CNVDid:CNVD-2012-3047date:2012-06-08T00:00:00
db:CNVDid:CNVD-2012-4099date:2012-08-07T00:00:00
db:CNVDid:CNVD-2012-4101date:2012-08-07T00:00:00
db:CNVDid:CNVD-2012-4100date:2012-08-07T00:00:00
db:BIDid:53811date:2012-06-05T00:00:00
db:JVNDBid:JVNDB-2012-002929date:2012-07-02T00:00:00
db:PACKETSTORMid:113312date:2012-06-06T03:39:38
db:CNNVDid:CNNVD-201206-070date:2012-06-07T00:00:00
db:NVDid:CVE-2012-3815date:2012-06-27T21:55:05.957