CVE-2013-0674
Vulnerability from cvelistv5
Published
2013-03-21 15:00
Modified
2024-09-16 19:47
Severity
Summary
Buffer overflow in the RegReader ActiveX control in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to execute arbitrary code via a long parameter.
References
Source | URL | Tags |
---|---|---|
ics-cert@hq.dhs.gov | http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf | US Government Resource |
ics-cert@hq.dhs.gov | http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf | Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the RegReader ActiveX control in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to execute arbitrary code via a long parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-21T15:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-0674", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the RegReader ActiveX control in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to execute arbitrary code via a long parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-0674", "datePublished": "2013-03-21T15:00:00Z", "dateReserved": "2012-12-19T00:00:00Z", "dateUpdated": "2024-09-16T19:47:06.437Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-0674\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2013-03-21T15:55:01.533\",\"lastModified\":\"2013-03-22T13:49:57.633\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the RegReader ActiveX control in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to execute arbitrary code via a long parameter.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer en el control ActiveX RegReader en Siemens WinCC antes de v7,2, tal como se utiliza en SIMATIC PCS v7 antes de v8,0 SP1 y otros productos, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un par\u00e1metro largo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":6.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_pcs7:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.0\",\"matchCriteriaId\":\"6EFF12A0-B105-4225-B818-F858C75047B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"33FA164B-E269-4140-AC85-2623356AF636\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.1\",\"matchCriteriaId\":\"B34F3397-62D2-4D9C-A3DA-1BEE4A2A69FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4CB277F-7ECB-4F44-8BB5-A3D350486EE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"616535F1-F609-408B-AE48-61ACF48748A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F322FCB-32F4-4C5A-A7F5-F7EF41188C88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"69822DB4-DC79-4F88-A470-5AC512C77377\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"996DE8BD-DD51-41EF-9882-C2BD2CC5FE53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"945C8B46-4CDA-4143-889C-30E30E93DB29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A33F9015-7058-419A-8762-CB2AE4ACF1A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6271FCC-CCF6-4D31-801A-B4B0DC4639DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF7A6B2B-D573-4285-B3B4-136F2BE7E710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"111D0F4D-2B67-46E8-BF8D-5D30EFE561EE\"}]}]}],\"references\":[{\"url\":\"http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...