CNVD-2016-07735
Vulnerability from cnvd - Published: 2016-09-20
VLAI Severity ?
Title
多款Rockwell Automation产品缓冲区溢出漏洞
Description
Rockwell Automation RSLogix Micro Starter Lite等都是美国罗克韦尔(Rockwell Automation)公司的用于自动化产品中的配置软件。
多款Rockwell Automation产品中存在缓冲区溢出漏洞。远程攻击者可借助特制的RSS项目文件利用该漏洞执行任意代码。
Severity
高
Patch Name
多款Rockwell Automation产品缓冲区溢出漏洞的补丁
Patch Description
Rockwell Automation RSLogix Micro Starter Lite等都是美国罗克韦尔(Rockwell Automation)公司的用于自动化产品中的配置软件。
多款Rockwell Automation产品中存在缓冲区溢出漏洞。远程攻击者可借助特制的RSS项目文件利用该漏洞执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已经发布了升级补丁以修复此安全问题,详情请关注厂商主页: https://rockwellautomation.co/
Reference
https://ics-cert.us-cert.gov/advisories/ICSA-16-224-02
Impacted products
| Name | ['Rockwell Automation RSLogix 500 Professional Edition 0', 'Rockwell Automation RSLogix 500 Standard Edition 0', 'Rockwell Automation RSLogix 500 Starter Edition 0', 'Rockwell Automation RSLogix Micro Developer 0', 'Rockwell Automation RSLogix Micro Starter Lite 0'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "92983"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2016-5814"
}
},
"description": "Rockwell Automation RSLogix Micro Starter Lite\u7b49\u90fd\u662f\u7f8e\u56fd\u7f57\u514b\u97e6\u5c14\uff08Rockwell Automation\uff09\u516c\u53f8\u7684\u7528\u4e8e\u81ea\u52a8\u5316\u4ea7\u54c1\u4e2d\u7684\u914d\u7f6e\u8f6f\u4ef6\u3002\r\n\r\n\u591a\u6b3eRockwell Automation\u4ea7\u54c1\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684RSS\u9879\u76ee\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "Ariele Caltabiano (kimiya) working with Trend Micro\u00e2??s Zero Day Initiative",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a\r\nhttps://rockwellautomation.co/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-07735",
"openTime": "2016-09-20",
"patchDescription": "Rockwell Automation RSLogix Micro Starter Lite\u7b49\u90fd\u662f\u7f8e\u56fd\u7f57\u514b\u97e6\u5c14\uff08Rockwell Automation\uff09\u516c\u53f8\u7684\u7528\u4e8e\u81ea\u52a8\u5316\u4ea7\u54c1\u4e2d\u7684\u914d\u7f6e\u8f6f\u4ef6\u3002\r\n\r\n\u591a\u6b3eRockwell Automation\u4ea7\u54c1\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684RSS\u9879\u76ee\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3eRockwell Automation\u4ea7\u54c1\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Rockwell Automation RSLogix 500 Professional Edition 0",
"Rockwell Automation RSLogix 500 Standard Edition 0",
"Rockwell Automation RSLogix 500 Starter Edition 0",
"Rockwell Automation RSLogix Micro Developer 0",
"Rockwell Automation RSLogix Micro Starter Lite 0"
]
},
"referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-16-224-02",
"serverity": "\u9ad8",
"submitTime": "2016-09-19",
"title": "\u591a\u6b3eRockwell Automation\u4ea7\u54c1\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…