VAR-201101-0361
Vulnerability from variot - Updated: 2023-12-18 13:20Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and earlier, when Run TCP/IP server is enabled, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823. Sielco Sistemi Winlog of TCP/IP The server contains a buffer overflow vulnerability. Sielco Sistemi Winlog In “Run TCP/IP server” There is a function of 46823/tcp using. A stack buffer overflow vulnerability exists in processing crafted packets. Attack code using this vulnerability has been released.Service disruption by a remote third party (DoS) An attacker may be able to attack or execute arbitrary code. Winlog Pro is an application for data acquisition and remote control of SCADA HMI monitoring software. The SCADA software can be run as a TCP/IP server by listening to the TCP 46823 port by enabling the \"Run TCP/IP server\" option in the project section \"Configuration->Options->TCP/IP\". The 0x02 opcode of the protocol is used to process some strings received by the client, and a function such as _TCPIP_WriteNumValueFP, _TCPIP_WriteDigValueFP or _TCPIP_WriteStrValueFP is called according to the data type. They parse the data using the same function at offset 00446795, and there is a stack overflow when copying the input data to the temporary buffer: 00446795 /$ 55 PUSH EBP 00446796 |. 8BEC MOV EBP, ESP 00446798 |. 83C4 C0 ADD ESP, -40 0044679B |. 53 PUSH EBX 0044679C |. 56 PUSH ESI 0044679D |. 57 PUSH EDI 0044679E |. 8B45 0C MOV EAX, DWORD PTR SS:[EBP+C] 004467A1 |. 8B5D 08 MOV EBX,DWORD PTR SS:[ EBP+8] 004467A4 |. 8BF8 MOV EDI,EAX 004467A6 |. 33C0 XOR EAX,EAX 004467A8 |. 56 PUSH ESI 004467A9 |. 83C9 FF OR ECX,FFFFFFFF 004467AC |. F2:AE REPNE SCAS BYTE PTR ES:[EDI] ; stren 004467AE |. F7D1 NOT ECX 004467B0 |. 2BF9 SUB EDI,ECX 004467B2 |. 8D75 C0 LEA ESI,DWORD PTR SS:[EBP-40] 004467B5 |. 87F7 XCHG EDI,ESI 004467B7 |. 8BD1 MOV EDX,ECX 004467B9 |. 8BC7 MOV EAX, EDI 00446 7BB |. C1E9 02 SHR ECX,2 004467BE |. F3:A5 REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS:[ESI] ; memcpy. Winlog Pro is prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input. Failed attacks will cause denial-of-service conditions. Winlog Pro 2.07.00 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------
Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM).
Request a free trial: http://secunia.com/products/corporate/vim/
TITLE: Winlog Pro TCP/IP Server Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA42894
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/42894/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=42894
RELEASE DATE: 2011-01-15
DISCUSS ADVISORY: http://secunia.com/advisories/42894/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/42894/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=42894
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Luigi Auriemma has reported a vulnerability in Winlog Pro, which can be exploited by malicious people to compromise a vulnerable system.
Successful exploitation may allow execution of arbitrary code, but requires the "Run TCP/IP Server" option to be enabled (disabled by default).
SOLUTION: Update to version 2.07.01.
PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma
ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/winlog_1-adv.txt
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201101-0361",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "winlog pro",
"scope": "lte",
"trust": 1.0,
"vendor": "sielcosistemi",
"version": "2.07.00"
},
{
"model": "sistemi winlog pro",
"scope": "eq",
"trust": 0.9,
"vendor": "sielco",
"version": "2.7"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "sielco",
"version": null
},
{
"model": "winlog lite",
"scope": "lt",
"trust": 0.8,
"vendor": "sielco sistemi",
"version": "2.07.01 earlier"
},
{
"model": "winlog pro",
"scope": "lt",
"trust": 0.8,
"vendor": "sielco sistemi",
"version": "2.07.01 earlier"
},
{
"model": "winlog pro",
"scope": "eq",
"trust": 0.6,
"vendor": "sielcosistemi",
"version": "2.07.00"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "winlog pro",
"version": "*"
},
{
"model": "sistemi winlog pro",
"scope": "ne",
"trust": 0.3,
"vendor": "sielco",
"version": "2.7.1"
}
],
"sources": [
{
"db": "IVD",
"id": "7d7e8b81-463f-11e9-9a21-000c29342cb1"
},
{
"db": "IVD",
"id": "1836b484-1fa3-11e6-abef-000c29c66e3d"
},
{
"db": "CERT/CC",
"id": "VU#496040"
},
{
"db": "CNVD",
"id": "CNVD-2011-0194"
},
{
"db": "BID",
"id": "45813"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001154"
},
{
"db": "NVD",
"id": "CVE-2011-0517"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-322"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:sielcosistemi:winlog_pro:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.07.00",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2011-0517"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Luigi Auriemma",
"sources": [
{
"db": "BID",
"id": "45813"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-322"
}
],
"trust": 0.9
},
"cve": "CVE-2011-0517",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2011-0517",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "7d7e8b81-463f-11e9-9a21-000c29342cb1",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "1836b484-1fa3-11e6-abef-000c29c66e3d",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2011-0517",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#496040",
"trust": 0.8,
"value": "1.10"
},
{
"author": "CNNVD",
"id": "CNNVD-201101-322",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "7d7e8b81-463f-11e9-9a21-000c29342cb1",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "1836b484-1fa3-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "CRITICAL"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7d7e8b81-463f-11e9-9a21-000c29342cb1"
},
{
"db": "IVD",
"id": "1836b484-1fa3-11e6-abef-000c29c66e3d"
},
{
"db": "CERT/CC",
"id": "VU#496040"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001154"
},
{
"db": "NVD",
"id": "CVE-2011-0517"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-322"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and earlier, when Run TCP/IP server is enabled, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823. Sielco Sistemi Winlog of TCP/IP The server contains a buffer overflow vulnerability. Sielco Sistemi Winlog In \u201cRun TCP/IP server\u201d There is a function of 46823/tcp using. A stack buffer overflow vulnerability exists in processing crafted packets. Attack code using this vulnerability has been released.Service disruption by a remote third party (DoS) An attacker may be able to attack or execute arbitrary code. Winlog Pro is an application for data acquisition and remote control of SCADA HMI monitoring software. The SCADA software can be run as a TCP/IP server by listening to the TCP 46823 port by enabling the \\\"Run TCP/IP server\\\" option in the project section \\\"Configuration-\u003eOptions-\u003eTCP/IP\\\". The 0x02 opcode of the protocol is used to process some strings received by the client, and a function such as _TCPIP_WriteNumValueFP, _TCPIP_WriteDigValueFP or _TCPIP_WriteStrValueFP is called according to the data type. They parse the data using the same function at offset 00446795, and there is a stack overflow when copying the input data to the temporary buffer: 00446795 /$ 55 PUSH EBP 00446796 |. 8BEC MOV EBP, ESP 00446798 |. 83C4 C0 ADD ESP, -40 0044679B |. 53 PUSH EBX 0044679C |. 56 PUSH ESI 0044679D |. 57 PUSH EDI 0044679E |. 8B45 0C MOV EAX, DWORD PTR SS:[EBP+C] 004467A1 |. 8B5D 08 MOV EBX,DWORD PTR SS:[ EBP+8] 004467A4 |. 8BF8 MOV EDI,EAX 004467A6 |. 33C0 XOR EAX,EAX 004467A8 |. 56 PUSH ESI 004467A9 |. 83C9 FF OR ECX,FFFFFFFF 004467AC |. F2:AE REPNE SCAS BYTE PTR ES:[EDI] ; stren 004467AE |. F7D1 NOT ECX 004467B0 |. 2BF9 SUB EDI,ECX 004467B2 |. 8D75 C0 LEA ESI,DWORD PTR SS:[EBP-40] 004467B5 |. 87F7 XCHG EDI,ESI 004467B7 |. 8BD1 MOV EDX,ECX 004467B9 |. 8BC7 MOV EAX, EDI 00446 7BB |. C1E9 02 SHR ECX,2 004467BE |. F3:A5 REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS:[ESI] ; memcpy. Winlog Pro is prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input. Failed attacks will cause denial-of-service conditions. \nWinlog Pro 2.07.00 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------\n\n\nSecure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). \n\nRequest a free trial: \nhttp://secunia.com/products/corporate/vim/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nWinlog Pro TCP/IP Server Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA42894\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/42894/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42894\n\nRELEASE DATE:\n2011-01-15\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/42894/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/42894/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42894\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nLuigi Auriemma has reported a vulnerability in Winlog Pro, which can\nbe exploited by malicious people to compromise a vulnerable system. \n\nSuccessful exploitation may allow execution of arbitrary code, but\nrequires the \"Run TCP/IP Server\" option to be enabled (disabled by\ndefault). \n\nSOLUTION:\nUpdate to version 2.07.01. \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/winlog_1-adv.txt\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-0517"
},
{
"db": "CERT/CC",
"id": "VU#496040"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001154"
},
{
"db": "CNVD",
"id": "CNVD-2011-0194"
},
{
"db": "BID",
"id": "45813"
},
{
"db": "IVD",
"id": "7d7e8b81-463f-11e9-9a21-000c29342cb1"
},
{
"db": "IVD",
"id": "1836b484-1fa3-11e6-abef-000c29c66e3d"
},
{
"db": "PACKETSTORM",
"id": "97557"
}
],
"trust": 3.6
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "45813",
"trust": 3.3
},
{
"db": "NVD",
"id": "CVE-2011-0517",
"trust": 3.1
},
{
"db": "ICS CERT",
"id": "ICSA-11-017-02",
"trust": 2.6
},
{
"db": "CERT/CC",
"id": "VU#496040",
"trust": 2.6
},
{
"db": "SECUNIA",
"id": "42894",
"trust": 2.5
},
{
"db": "EXPLOIT-DB",
"id": "15992",
"trust": 2.4
},
{
"db": "VUPEN",
"id": "ADV-2011-0126",
"trust": 2.4
},
{
"db": "OSVDB",
"id": "70418",
"trust": 2.4
},
{
"db": "XF",
"id": "64716",
"trust": 1.4
},
{
"db": "CNVD",
"id": "CNVD-2011-0194",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201101-322",
"trust": 1.0
},
{
"db": "SREASON",
"id": "8280",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001154",
"trust": 0.8
},
{
"db": "NSFOCUS",
"id": "17104",
"trust": 0.6
},
{
"db": "IVD",
"id": "7D7E8B81-463F-11E9-9A21-000C29342CB1",
"trust": 0.2
},
{
"db": "IVD",
"id": "1836B484-1FA3-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "97557",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7d7e8b81-463f-11e9-9a21-000c29342cb1"
},
{
"db": "IVD",
"id": "1836b484-1fa3-11e6-abef-000c29c66e3d"
},
{
"db": "CERT/CC",
"id": "VU#496040"
},
{
"db": "CNVD",
"id": "CNVD-2011-0194"
},
{
"db": "BID",
"id": "45813"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001154"
},
{
"db": "PACKETSTORM",
"id": "97557"
},
{
"db": "NVD",
"id": "CVE-2011-0517"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-322"
}
]
},
"id": "VAR-201101-0361",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7d7e8b81-463f-11e9-9a21-000c29342cb1"
},
{
"db": "IVD",
"id": "1836b484-1fa3-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-0194"
}
],
"trust": 1.875
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "7d7e8b81-463f-11e9-9a21-000c29342cb1"
},
{
"db": "IVD",
"id": "1836b484-1fa3-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-0194"
}
]
},
"last_update_date": "2023-12-18T13:20:18.358000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.sielcosistemi.com/en/products/winlog_scada_hmi/index.html"
},
{
"title": "Winlog Pro malformed message stack buffer overflow vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/2609"
},
{
"title": "WinlogLite_Setup",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=37217"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0194"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001154"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-322"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-001154"
},
{
"db": "NVD",
"id": "CVE-2011-0517"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-017-02.pdf"
},
{
"trust": 2.4,
"url": "http://osvdb.org/70418"
},
{
"trust": 2.4,
"url": "http://secunia.com/advisories/42894"
},
{
"trust": 2.4,
"url": "http://www.securityfocus.com/bid/45813"
},
{
"trust": 2.4,
"url": "http://www.vupen.com/english/advisories/2011/0126"
},
{
"trust": 1.8,
"url": "http://www.kb.cert.org/vuls/id/496040"
},
{
"trust": 1.6,
"url": "http://aluigi.org/adv/winlog_1-adv.txt"
},
{
"trust": 1.6,
"url": "http://www.exploit-db.com/exploits/15992"
},
{
"trust": 1.4,
"url": "http://xforce.iss.net/xforce/xfdb/64716"
},
{
"trust": 1.0,
"url": "http://aluigi.altervista.org/adv/winlog_1-adv.txt"
},
{
"trust": 1.0,
"url": "http://securityreason.com/securityalert/8280"
},
{
"trust": 1.0,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64716"
},
{
"trust": 0.8,
"url": "http://www.exploit-db.com/exploits/15992/"
},
{
"trust": 0.8,
"url": "http://www.sielcosistemi.com/download/winloglite_setup.exe"
},
{
"trust": 0.8,
"url": "http://www.sielcosistemi.com/download/winlog_setup_sf.exe"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0517"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu496040"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0517"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/17104"
},
{
"trust": 0.3,
"url": "http://www.sielcosistemi.com/en/products/winlog_scada_hmi/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/42894/"
},
{
"trust": 0.1,
"url": "http://secunia.com/products/corporate/evm/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/42894/#comments"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/products/corporate/vim/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42894"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#496040"
},
{
"db": "CNVD",
"id": "CNVD-2011-0194"
},
{
"db": "BID",
"id": "45813"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001154"
},
{
"db": "PACKETSTORM",
"id": "97557"
},
{
"db": "NVD",
"id": "CVE-2011-0517"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-322"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7d7e8b81-463f-11e9-9a21-000c29342cb1"
},
{
"db": "IVD",
"id": "1836b484-1fa3-11e6-abef-000c29c66e3d"
},
{
"db": "CERT/CC",
"id": "VU#496040"
},
{
"db": "CNVD",
"id": "CNVD-2011-0194"
},
{
"db": "BID",
"id": "45813"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001154"
},
{
"db": "PACKETSTORM",
"id": "97557"
},
{
"db": "NVD",
"id": "CVE-2011-0517"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-322"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-01-17T00:00:00",
"db": "IVD",
"id": "7d7e8b81-463f-11e9-9a21-000c29342cb1"
},
{
"date": "2011-01-17T00:00:00",
"db": "IVD",
"id": "1836b484-1fa3-11e6-abef-000c29c66e3d"
},
{
"date": "2011-02-03T00:00:00",
"db": "CERT/CC",
"id": "VU#496040"
},
{
"date": "2011-01-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-0194"
},
{
"date": "2011-01-14T00:00:00",
"db": "BID",
"id": "45813"
},
{
"date": "2011-03-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-001154"
},
{
"date": "2011-01-14T03:38:37",
"db": "PACKETSTORM",
"id": "97557"
},
{
"date": "2011-01-20T19:00:12.287000",
"db": "NVD",
"id": "CVE-2011-0517"
},
{
"date": "2011-01-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201101-322"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-02-03T00:00:00",
"db": "CERT/CC",
"id": "VU#496040"
},
{
"date": "2011-01-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-0194"
},
{
"date": "2015-03-19T09:45:00",
"db": "BID",
"id": "45813"
},
{
"date": "2011-03-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-001154"
},
{
"date": "2017-08-17T01:33:35.853000",
"db": "NVD",
"id": "CVE-2011-0517"
},
{
"date": "2011-01-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201101-322"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201101-322"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Winlog Pro Malformed message stack buffer overflow vulnerability",
"sources": [
{
"db": "IVD",
"id": "7d7e8b81-463f-11e9-9a21-000c29342cb1"
},
{
"db": "IVD",
"id": "1836b484-1fa3-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-0194"
}
],
"trust": 1.0
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow",
"sources": [
{
"db": "IVD",
"id": "7d7e8b81-463f-11e9-9a21-000c29342cb1"
},
{
"db": "IVD",
"id": "1836b484-1fa3-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-322"
}
],
"trust": 1.0
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.