VAR-201109-0182
Vulnerability from variot - Updated: 2023-12-18 13:40RnaUtility.dll in RsvcHost.exe 2.30.0.23 in Rockwell RSLogix 19 and earlier allows remote attackers to cause a denial of service (crash) via a crafted rna packet with a long string to TCP port 4446 that triggers (1) "a memset zero overflow" or (2) an out-of-bounds read, related to improper handling of a 32-bit size field. RSLinx Classic connects RSLogix and RSNetWorx products to Rockwell Automation networks and devices, and is also an OPC server. RsvcHost.exe and RNADiagReceiver.exe listen to 4446 and other ports. Rockwell RSLogix is a programming software for industrial automation. An attacker could exploit this vulnerability to execute arbitrary code for an attack. RSLogix is prone to a denial-of-service vulnerability. Attackers can exploit this issue to crash the application, denying service to legitimate users. RSLogix 5000 is vulnerable. Other versions may also be affected. A buffer overflow vulnerability exists in RnaUtility.dll in RsvcHost.exe version 2.30.0.23 of Rockwell RSLogix 19 and earlier
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201109-0182",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "rslogix",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "19"
},
{
"model": "rslogix",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "19"
},
{
"model": "automation rslogix/factorytalk",
"scope": "lte",
"trust": 0.6,
"vendor": "rockwell",
"version": "\u003c=19"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwall",
"version": "5000"
},
{
"model": "automation rockwell rslogix",
"scope": "lte",
"trust": 0.6,
"vendor": "rockwell",
"version": "\u003c=19"
},
{
"model": "rslogix",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "19"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "rslogix",
"version": "*"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwall",
"version": "500019"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwall",
"version": "500018"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwall",
"version": "500017"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwall",
"version": "50000"
},
{
"model": "automation factorytalk cpr9-sr4",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9-sr3",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9-sr2",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9-sr1",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwall",
"version": "0"
},
{
"model": "automation",
"scope": "eq",
"trust": 0.2,
"vendor": "rockwell",
"version": "*"
},
{
"model": "rslogix",
"scope": "lte",
"trust": 0.2,
"vendor": "rockwell",
"version": "\u003c=19"
}
],
"sources": [
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"db": "BID",
"id": "49608"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"db": "NVD",
"id": "CVE-2011-3489"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-262"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:rslogix:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "19",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2011-3489"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Luigi Auriemma",
"sources": [
{
"db": "BID",
"id": "49608"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-186"
}
],
"trust": 0.9
},
"cve": "CVE-2011-3489",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2011-3489",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "a50faadc-2354-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.3 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-51434",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2011-3489",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201109-262",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-51434",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-51434"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"db": "NVD",
"id": "CVE-2011-3489"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-262"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "RnaUtility.dll in RsvcHost.exe 2.30.0.23 in Rockwell RSLogix 19 and earlier allows remote attackers to cause a denial of service (crash) via a crafted rna packet with a long string to TCP port 4446 that triggers (1) \"a memset zero overflow\" or (2) an out-of-bounds read, related to improper handling of a 32-bit size field. RSLinx Classic connects RSLogix and RSNetWorx products to Rockwell Automation networks and devices, and is also an OPC server. RsvcHost.exe and RNADiagReceiver.exe listen to 4446 and other ports. Rockwell RSLogix is a programming software for industrial automation. An attacker could exploit this vulnerability to execute arbitrary code for an attack. RSLogix is prone to a denial-of-service vulnerability. \nAttackers can exploit this issue to crash the application, denying service to legitimate users. \nRSLogix 5000 is vulnerable. Other versions may also be affected. A buffer overflow vulnerability exists in RnaUtility.dll in RsvcHost.exe version 2.30.0.23 of Rockwell RSLogix 19 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-3489"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"db": "BID",
"id": "49608"
},
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-51434"
}
],
"trust": 4.14
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-51434",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-51434"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2011-3489",
"trust": 3.8
},
{
"db": "BID",
"id": "49608",
"trust": 2.6
},
{
"db": "CNNVD",
"id": "CNNVD-201109-262",
"trust": 1.1
},
{
"db": "SREASON",
"id": "8383",
"trust": 1.1
},
{
"db": "CNVD",
"id": "CNVD-2011-3724",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2011-3647",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2011-3683",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252",
"trust": 0.8
},
{
"db": "EXPLOIT-DB",
"id": "17843",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201109-186",
"trust": 0.6
},
{
"db": "ICS CERT ALERT",
"id": "ICS-ALERT-11-256-05A",
"trust": 0.3
},
{
"db": "ICS CERT",
"id": "ICSA-11-273-03",
"trust": 0.3
},
{
"db": "IVD",
"id": "A50FAADC-2354-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "IVD",
"id": "E84A6D20-1F88-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "IVD",
"id": "D48E7D58-1F88-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-51434",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"db": "VULHUB",
"id": "VHN-51434"
},
{
"db": "BID",
"id": "49608"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"db": "NVD",
"id": "CVE-2011-3489"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-262"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-186"
}
]
},
"id": "VAR-201109-0182",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"db": "VULHUB",
"id": "VHN-51434"
}
],
"trust": 3.333333325
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 2.4
}
],
"sources": [
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "CNVD",
"id": "CNVD-2011-3683"
}
]
},
"last_update_date": "2023-12-18T13:40:09.667000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.rockwellautomation.com/"
},
{
"title": "Design \u0026 Configuration",
"trust": 0.8,
"url": "http://www.rockwellautomation.com/rockwellsoftware/design/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-51434"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"db": "NVD",
"id": "CVE-2011-3489"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.2,
"url": "http://aluigi.altervista.org/adv/rslogix_1-adv.txt"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/49608"
},
{
"trust": 1.1,
"url": "http://securityreason.com/securityalert/8383"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69808"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3489"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3489"
},
{
"trust": 0.6,
"url": "http://www.exploit-db.com/exploits/17843/"
},
{
"trust": 0.3,
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/456144"
},
{
"trust": 0.3,
"url": "http://www.rockwellautomation.com/rockwellsoftware/design/rslogix5000/"
},
{
"trust": 0.3,
"url": "http://aluigi.org/poc/rslogix_1.zip"
},
{
"trust": 0.3,
"url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-11-256-05a.pdf"
},
{
"trust": 0.3,
"url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-273-03.pdf"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"db": "VULHUB",
"id": "VHN-51434"
},
{
"db": "BID",
"id": "49608"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"db": "NVD",
"id": "CVE-2011-3489"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-262"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-186"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"db": "VULHUB",
"id": "VHN-51434"
},
{
"db": "BID",
"id": "49608"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"db": "NVD",
"id": "CVE-2011-3489"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-262"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-186"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-09-20T00:00:00",
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"date": "2011-09-14T00:00:00",
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"date": "2011-09-15T00:00:00",
"db": "IVD",
"id": "d48e7d58-1f88-11e6-abef-000c29c66e3d"
},
{
"date": "2011-09-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"date": "2011-09-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"date": "2011-09-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"date": "2011-09-16T00:00:00",
"db": "VULHUB",
"id": "VHN-51434"
},
{
"date": "2011-09-13T00:00:00",
"db": "BID",
"id": "49608"
},
{
"date": "2011-09-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"date": "2011-09-16T14:28:12.060000",
"db": "NVD",
"id": "CVE-2011-3489"
},
{
"date": "2011-09-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201109-262"
},
{
"date": "1900-01-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201109-186"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-09-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-3724"
},
{
"date": "2011-09-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"date": "2011-09-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-3683"
},
{
"date": "2017-08-29T00:00:00",
"db": "VULHUB",
"id": "VHN-51434"
},
{
"date": "2011-09-30T22:50:00",
"db": "BID",
"id": "49608"
},
{
"date": "2011-09-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-002252"
},
{
"date": "2017-08-29T01:30:12.740000",
"db": "NVD",
"id": "CVE-2011-3489"
},
{
"date": "2011-09-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201109-262"
},
{
"date": "2011-09-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201109-186"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201109-262"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-186"
}
],
"trust": 1.2
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "RSLogix Remote Denial of Service Vulnerability",
"sources": [
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-3647"
},
{
"db": "BID",
"id": "49608"
}
],
"trust": 1.1
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow",
"sources": [
{
"db": "IVD",
"id": "a50faadc-2354-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "e84a6d20-1f88-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-262"
}
],
"trust": 1.0
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.