ID

VAR-201709-1044


CVE

CVE-2017-13684


TITLE

Unisys MCP-FIRMWARE Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-008549

DESCRIPTION

Unisys Libra 64xx and 84xx and FS601 class systems with MCP-FIRMWARE before 43.211 allow remote authenticated users to cause a denial of service (program crash) or have unspecified other impact via vectors related to incorrect literal handling, which trigger CPM stack corruption. Unisys MCP-FIRMWARE Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Unisys Libra 64xx, 84xx and FS601 with MCP-FIRMWARE are all MCP-based application system architectures developed by Unisys Corporation of the United States. A security vulnerability exists in versions prior to MCP-FIRMWARE 43.211 in Unisys Libra 64xx, 84xx, and FS601. An attacker could exploit this vulnerability to cause a denial of service (program crash)

Trust: 1.71

sources: NVD: CVE-2017-13684 // JVNDB: JVNDB-2017-008549 // VULHUB: VHN-104331

AFFECTED PRODUCTS

vendor:unisysmodel:mcp-scope:lteversion:43.185

Trust: 1.0

vendor:unisysmodel:mcp-scope:ltversion:43.211

Trust: 0.8

vendor:unisysmodel:mcp-scope:eqversion:43.185

Trust: 0.6

sources: JVNDB: JVNDB-2017-008549 // CNNVD: CNNVD-201708-1074 // NVD: CVE-2017-13684

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-13684
value: HIGH

Trust: 1.0

NVD: CVE-2017-13684
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201708-1074
value: MEDIUM

Trust: 0.6

VULHUB: VHN-104331
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-13684
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-104331
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-13684
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-104331 // JVNDB: JVNDB-2017-008549 // CNNVD: CNNVD-201708-1074 // NVD: CVE-2017-13684

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-104331 // JVNDB: JVNDB-2017-008549 // NVD: CVE-2017-13684

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201708-1074

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201708-1074

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-008549

PATCH

title:UIS-2017-4url:https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=44

Trust: 0.8

sources: JVNDB: JVNDB-2017-008549

EXTERNAL IDS

db:NVDid:CVE-2017-13684

Trust: 2.5

db:JVNDBid:JVNDB-2017-008549

Trust: 0.8

db:CNNVDid:CNNVD-201708-1074

Trust: 0.7

db:VULHUBid:VHN-104331

Trust: 0.1

sources: VULHUB: VHN-104331 // JVNDB: JVNDB-2017-008549 // CNNVD: CNNVD-201708-1074 // NVD: CVE-2017-13684

REFERENCES

url:https://public.support.unisys.com/common/public/vulnerability/nvd_detail_rpt.aspx?id=44

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13684

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-13684

Trust: 0.8

sources: VULHUB: VHN-104331 // JVNDB: JVNDB-2017-008549 // CNNVD: CNNVD-201708-1074 // NVD: CVE-2017-13684

SOURCES

db:VULHUBid:VHN-104331
db:JVNDBid:JVNDB-2017-008549
db:CNNVDid:CNNVD-201708-1074
db:NVDid:CVE-2017-13684

LAST UPDATE DATE

2025-04-20T23:40:01.408000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-104331date:2017-10-10T00:00:00
db:JVNDBid:JVNDB-2017-008549date:2017-10-23T00:00:00
db:CNNVDid:CNNVD-201708-1074date:2018-01-02T00:00:00
db:NVDid:CVE-2017-13684date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-104331date:2017-09-30T00:00:00
db:JVNDBid:JVNDB-2017-008549date:2017-10-23T00:00:00
db:CNNVDid:CNNVD-201708-1074date:2017-08-25T00:00:00
db:NVDid:CVE-2017-13684date:2017-09-30T01:29:01.037