VAR-201201-0028
Vulnerability from variot - Updated: 2023-12-18 13:53Siemens Automation License Manager (ALM) 4.0 through 5.1+SP1+Upd1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted content in a (1) get_target_ocx_param or (2) send_target_ocx_param command. The Siemens Automation License Manager is the authorization manager program for Siemens software. Some long fields can be used to trigger exceptions: The exception unknown software exception (0xc0000417) occurred in the application at location 0x????????. This exception is due to some functions using wcscpy_s to copy the value provided by the client to Caused by the stack buffer. Remote attackers can exploit these issues to execute arbitrary code in the context of the application or cause denial-of-service conditions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201201-0028",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "automation license manager",
"scope": "eq",
"trust": 1.8,
"vendor": "siemens",
"version": "500.0.1221"
},
{
"model": "automation license manager",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "5.1"
},
{
"model": "automation license manager",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "4.0 to 5.1+sp1+upd1"
},
{
"model": "automation license manager",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5.1"
},
{
"model": "automation license manager",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "501.1.102.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "automation license manager",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "3cc922d2-2354-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-5099"
},
{
"db": "CNVD",
"id": "CNVD-2011-5101"
},
{
"db": "CNVD",
"id": "CNVD-2011-5097"
},
{
"db": "BID",
"id": "50830"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001030"
},
{
"db": "NVD",
"id": "CVE-2011-4531"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-081"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:automation_license_manager:*:sp1:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2011-4531"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Luigi Auriemma",
"sources": [
{
"db": "BID",
"id": "50830"
},
{
"db": "CNNVD",
"id": "CNNVD-201111-482"
}
],
"trust": 0.9
},
"cve": "CVE-2011-4531",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2011-4531",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "3cc922d2-2354-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-52476",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2011-4531",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201201-081",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "3cc922d2-2354-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-52476",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "3cc922d2-2354-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-52476"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001030"
},
{
"db": "NVD",
"id": "CVE-2011-4531"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-081"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens Automation License Manager (ALM) 4.0 through 5.1+SP1+Upd1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted content in a (1) get_target_ocx_param or (2) send_target_ocx_param command. The Siemens Automation License Manager is the authorization manager program for Siemens software. Some long fields can be used to trigger exceptions: The exception unknown software exception (0xc0000417) occurred in the application at location 0x????????. This exception is due to some functions using wcscpy_s to copy the value provided by the client to Caused by the stack buffer. \nRemote attackers can exploit these issues to execute arbitrary code in the context of the application or cause denial-of-service conditions",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-4531"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001030"
},
{
"db": "CNVD",
"id": "CNVD-2011-5099"
},
{
"db": "CNVD",
"id": "CNVD-2011-5101"
},
{
"db": "CNVD",
"id": "CNVD-2011-5097"
},
{
"db": "BID",
"id": "50830"
},
{
"db": "IVD",
"id": "3cc922d2-2354-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-52476"
}
],
"trust": 3.78
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-52476",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-52476"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2011-4531",
"trust": 3.0
},
{
"db": "ICS CERT",
"id": "ICSA-11-361-01",
"trust": 2.8
},
{
"db": "BID",
"id": "50830",
"trust": 2.7
},
{
"db": "CNNVD",
"id": "CNNVD-201201-081",
"trust": 0.9
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001030",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2011-5099",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2011-5101",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2011-5097",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201111-482",
"trust": 0.6
},
{
"db": "IVD",
"id": "3CC922D2-2354-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "EXPLOIT-DB",
"id": "18165",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-52476",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "3cc922d2-2354-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-5099"
},
{
"db": "CNVD",
"id": "CNVD-2011-5101"
},
{
"db": "CNVD",
"id": "CNVD-2011-5097"
},
{
"db": "VULHUB",
"id": "VHN-52476"
},
{
"db": "BID",
"id": "50830"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001030"
},
{
"db": "NVD",
"id": "CVE-2011-4531"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-081"
},
{
"db": "CNNVD",
"id": "CNNVD-201111-482"
}
]
},
"id": "VAR-201201-0028",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "3cc922d2-2354-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-5099"
},
{
"db": "CNVD",
"id": "CNVD-2011-5101"
},
{
"db": "CNVD",
"id": "CNVD-2011-5097"
},
{
"db": "VULHUB",
"id": "VHN-52476"
}
],
"trust": 2.722807
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 2.0
}
],
"sources": [
{
"db": "IVD",
"id": "3cc922d2-2354-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-5099"
},
{
"db": "CNVD",
"id": "CNVD-2011-5101"
},
{
"db": "CNVD",
"id": "CNVD-2011-5097"
}
]
},
"last_update_date": "2023-12-18T13:53:37.366000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "57252401",
"trust": 0.8,
"url": "http://support.automation.siemens.com/ww/llisapi.dll/57252401?func=ll\u0026objid=57252401\u0026objaction=csview\u0026nodeid0=17323948\u0026lang=en\u0026siteid=cseus\u0026aktprim=0\u0026extranet=standard\u0026viewreg=ww\u0026load=content\\"
},
{
"title": "114358",
"trust": 0.8,
"url": "http://support.automation.siemens.com/ww/llisapi.dll?func=cslib.csinfo\u0026lang=en\u0026objid=114358\u0026caller=view"
},
{
"title": "\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u30d1\u30fc\u30c8\u30ca\u30fc",
"trust": 0.8,
"url": "http://www.automation.siemens.com/automation/jp/ja/solutionpartner/pages/default.aspx"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.siemens.com/entry/jp/ja/"
},
{
"title": "Siemens Automation License Manager denial of service vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/72712"
},
{
"title": "Patch for Siemens Automation License Manager Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/72722"
},
{
"title": "ALMv5_1_1_3",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=42332"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-5101"
},
{
"db": "CNVD",
"id": "CNVD-2011-5097"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001030"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-081"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-52476"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001030"
},
{
"db": "NVD",
"id": "CVE-2011-4531"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.2,
"url": "http://aluigi.altervista.org/adv/almsrvx_1-adv.txt"
},
{
"trust": 2.8,
"url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-361-01.pdf"
},
{
"trust": 1.7,
"url": "http://support.automation.siemens.com/ww/view/en/114358"
},
{
"trust": 1.6,
"url": "http://support.automation.siemens.com/ww/llisapi.dll/57252401?func=ll\u0026objid=57252401\u0026objaction=csview\u0026nodeid0=17323948\u0026lang=en\u0026siteid=cseus\u0026aktprim=0\u0026extranet=standard\u0026viewreg=ww\u0026load=content"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4531"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4531"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/50830"
},
{
"trust": 0.3,
"url": "http://support.automation.siemens.com/ww/llisapi.dll?func=cslib.csinfo\u0026lang=en\u0026siteid=cseus\u0026aktprim=0\u0026extranet=standard\u0026viewreg=ww\u0026objid=17323948\u0026tree"
},
{
"trust": 0.3,
"url": "/archive/1/520660"
},
{
"trust": 0.1,
"url": "http://support.automation.siemens.com/ww/llisapi.dll/57252401?func=ll\u0026amp;objid=57252401\u0026amp;objaction=csview\u0026amp;nodeid0=17323948\u0026amp;lang=en\u0026amp;siteid=cseus\u0026amp;aktprim=0\u0026amp;extranet=standard\u0026amp;viewreg=ww\u0026amp;load=content"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-5099"
},
{
"db": "CNVD",
"id": "CNVD-2011-5101"
},
{
"db": "VULHUB",
"id": "VHN-52476"
},
{
"db": "BID",
"id": "50830"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001030"
},
{
"db": "NVD",
"id": "CVE-2011-4531"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-081"
},
{
"db": "CNNVD",
"id": "CNNVD-201111-482"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "3cc922d2-2354-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2011-5099"
},
{
"db": "CNVD",
"id": "CNVD-2011-5101"
},
{
"db": "CNVD",
"id": "CNVD-2011-5097"
},
{
"db": "VULHUB",
"id": "VHN-52476"
},
{
"db": "BID",
"id": "50830"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001030"
},
{
"db": "NVD",
"id": "CVE-2011-4531"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-081"
},
{
"db": "CNNVD",
"id": "CNNVD-201111-482"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-01-11T00:00:00",
"db": "IVD",
"id": "3cc922d2-2354-11e6-abef-000c29c66e3d"
},
{
"date": "2011-12-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-5099"
},
{
"date": "2011-12-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-5101"
},
{
"date": "2011-12-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-5097"
},
{
"date": "2012-01-08T00:00:00",
"db": "VULHUB",
"id": "VHN-52476"
},
{
"date": "2011-11-28T00:00:00",
"db": "BID",
"id": "50830"
},
{
"date": "2012-01-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-001030"
},
{
"date": "2012-01-08T20:55:01.280000",
"db": "NVD",
"id": "CVE-2011-4531"
},
{
"date": "2012-01-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201201-081"
},
{
"date": "1900-01-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201111-482"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-12-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-5099"
},
{
"date": "2016-03-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-5101"
},
{
"date": "2016-03-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-5097"
},
{
"date": "2012-01-09T00:00:00",
"db": "VULHUB",
"id": "VHN-52476"
},
{
"date": "2012-01-04T00:20:00",
"db": "BID",
"id": "50830"
},
{
"date": "2012-01-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-001030"
},
{
"date": "2012-01-09T22:52:26.123000",
"db": "NVD",
"id": "CVE-2011-4531"
},
{
"date": "2012-01-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201201-081"
},
{
"date": "2011-11-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201111-482"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201201-081"
},
{
"db": "CNNVD",
"id": "CNNVD-201111-482"
}
],
"trust": 1.2
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens Automation License Manager Buffer Overflow and Denial of Service Vulnerabilities",
"sources": [
{
"db": "BID",
"id": "50830"
},
{
"db": "CNNVD",
"id": "CNNVD-201111-482"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input validation",
"sources": [
{
"db": "IVD",
"id": "3cc922d2-2354-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-081"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.