VAR-201204-0174
Vulnerability from variot - Updated: 2023-12-18 13:34The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted packet. Rockwell Automation is a provider of industrial automation, control and information technology solutions. Rockwell Automation FactoryTalk Activation Server RNADiagReceiver has errors in processing packets. Submitting a packet containing more than 2000 bytes to UDP port 4445 can result in no subsequent connections. An attacker can exploit these issues to crash the affected application, denying service to legitimate users
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201204-0174",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "factorytalk",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "cpr9_sr5"
},
{
"model": "rslogix 5000",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "20"
},
{
"model": "rslogix 5000",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "17"
},
{
"model": "rslogix 5000",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "19"
},
{
"model": "factorytalk",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "cpr9"
},
{
"model": "rslogix 5000",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "18"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 1.5,
"vendor": "rockwall",
"version": "500018"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 1.5,
"vendor": "rockwall",
"version": "500019"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 1.5,
"vendor": "rockwall",
"version": "500017"
},
{
"model": "automation factorytalk activation server",
"scope": "eq",
"trust": 1.5,
"vendor": "rockwall",
"version": "3.2"
},
{
"model": "factorytalk",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "cpr9 to sr5"
},
{
"model": "rslogix 5000",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "17 to 20"
},
{
"model": null,
"scope": null,
"trust": 0.6,
"vendor": "no",
"version": null
},
{
"model": "cpr9",
"scope": null,
"trust": 0.4,
"vendor": "factorytalk",
"version": null
},
{
"model": "cpr9 sr5",
"scope": null,
"trust": 0.4,
"vendor": "factorytalk",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "rslogix 5000",
"version": "17"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "rslogix 5000",
"version": "18"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "rslogix 5000",
"version": "19"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "rslogix 5000",
"version": "20"
},
{
"model": "automation factorytalk cpr9-sr5",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9-sr4",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9-sr3",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9-sr2",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9-sr1",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwall",
"version": "0"
}
],
"sources": [
{
"db": "IVD",
"id": "7d70a8d0-463f-11e9-be91-000c29342cb1"
},
{
"db": "IVD",
"id": "f9f79006-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"db": "CNVD",
"id": "CNVD-2012-8874"
},
{
"db": "BID",
"id": "51444"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001983"
},
{
"db": "NVD",
"id": "CVE-2012-0222"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-004"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:factorytalk:cpr9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:rslogix_5000:20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:factorytalk:cpr9_sr5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:rslogix_5000:17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:rslogix_5000:18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:rslogix_5000:19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2012-0222"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Luigi Auriemma",
"sources": [
{
"db": "BID",
"id": "51444"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-287"
}
],
"trust": 0.9
},
"cve": "CVE-2012-0222",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2012-0222",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2012-8874",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "7d70a8d0-463f-11e9-be91-000c29342cb1",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "f9f79006-2353-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-53503",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2012-0222",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2012-8874",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201204-004",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "7d70a8d0-463f-11e9-be91-000c29342cb1",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "f9f79006-2353-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-53503",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7d70a8d0-463f-11e9-be91-000c29342cb1"
},
{
"db": "IVD",
"id": "f9f79006-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-8874"
},
{
"db": "VULHUB",
"id": "VHN-53503"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001983"
},
{
"db": "NVD",
"id": "CVE-2012-0222"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-004"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted packet. Rockwell Automation is a provider of industrial automation, control and information technology solutions. Rockwell Automation FactoryTalk Activation Server RNADiagReceiver has errors in processing packets. Submitting a packet containing more than 2000 bytes to UDP port 4445 can result in no subsequent connections. \nAn attacker can exploit these issues to crash the affected application, denying service to legitimate users",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-0222"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001983"
},
{
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"db": "CNVD",
"id": "CNVD-2012-8874"
},
{
"db": "BID",
"id": "51444"
},
{
"db": "IVD",
"id": "7d70a8d0-463f-11e9-be91-000c29342cb1"
},
{
"db": "IVD",
"id": "f9f79006-2353-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-53503"
}
],
"trust": 3.96
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-0222",
"trust": 3.8
},
{
"db": "ICS CERT",
"id": "ICSA-12-088-01",
"trust": 3.4
},
{
"db": "BID",
"id": "51444",
"trust": 2.1
},
{
"db": "CNNVD",
"id": "CNNVD-201204-004",
"trust": 1.1
},
{
"db": "ICS CERT ALERT",
"id": "ICS-ALERT-12-017-01",
"trust": 1.1
},
{
"db": "CNVD",
"id": "CNVD-2012-8874",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001983",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2012-0190",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2012-0189",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201201-287",
"trust": 0.6
},
{
"db": "IVD",
"id": "7D70A8D0-463F-11E9-BE91-000C29342CB1",
"trust": 0.2
},
{
"db": "IVD",
"id": "F9F79006-2353-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-53503",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7d70a8d0-463f-11e9-be91-000c29342cb1"
},
{
"db": "IVD",
"id": "f9f79006-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"db": "CNVD",
"id": "CNVD-2012-8874"
},
{
"db": "VULHUB",
"id": "VHN-53503"
},
{
"db": "BID",
"id": "51444"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001983"
},
{
"db": "NVD",
"id": "CVE-2012-0222"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-287"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-004"
}
]
},
"id": "VAR-201204-0174",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7d70a8d0-463f-11e9-be91-000c29342cb1"
},
{
"db": "IVD",
"id": "f9f79006-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"db": "CNVD",
"id": "CNVD-2012-8874"
},
{
"db": "VULHUB",
"id": "VHN-53503"
}
],
"trust": 3.125
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 2.2
}
],
"sources": [
{
"db": "IVD",
"id": "7d70a8d0-463f-11e9-be91-000c29342cb1"
},
{
"db": "IVD",
"id": "f9f79006-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"db": "CNVD",
"id": "CNVD-2012-8874"
}
]
},
"last_update_date": "2023-12-18T13:34:53.328000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "RSLogix 5000",
"trust": 0.8,
"url": "http://www.rockwellautomation.com/rockwellsoftware/design/rslogix5000/"
},
{
"title": "FactoryTalk",
"trust": 0.8,
"url": "http://www.rockwellautomation.com/rockwellsoftware/factorytalk/"
},
{
"title": "Patch for Rockwell Automation Allen-Bradley FactoryTalk Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/36064"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-8874"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001983"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-53503"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001983"
},
{
"db": "NVD",
"id": "CVE-2012-0222"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-088-01.pdf"
},
{
"trust": 1.7,
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937"
},
{
"trust": 1.5,
"url": "http://aluigi.altervista.org/adv/rnadiagreceiver_1-adv.txt"
},
{
"trust": 1.1,
"url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-12-017-01.pdf"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0222"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0222"
},
{
"trust": 0.6,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-12-088-01"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/51444"
},
{
"trust": 0.3,
"url": "http://www.rockwellautomation.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"db": "CNVD",
"id": "CNVD-2012-8874"
},
{
"db": "VULHUB",
"id": "VHN-53503"
},
{
"db": "BID",
"id": "51444"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001983"
},
{
"db": "NVD",
"id": "CVE-2012-0222"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-287"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-004"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7d70a8d0-463f-11e9-be91-000c29342cb1"
},
{
"db": "IVD",
"id": "f9f79006-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"db": "CNVD",
"id": "CNVD-2012-8874"
},
{
"db": "VULHUB",
"id": "VHN-53503"
},
{
"db": "BID",
"id": "51444"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001983"
},
{
"db": "NVD",
"id": "CVE-2012-0222"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-287"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-004"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-04-05T00:00:00",
"db": "IVD",
"id": "7d70a8d0-463f-11e9-be91-000c29342cb1"
},
{
"date": "2012-04-05T00:00:00",
"db": "IVD",
"id": "f9f79006-2353-11e6-abef-000c29c66e3d"
},
{
"date": "2012-01-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"date": "2012-01-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"date": "2012-04-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-8874"
},
{
"date": "2012-04-02T00:00:00",
"db": "VULHUB",
"id": "VHN-53503"
},
{
"date": "2012-01-17T00:00:00",
"db": "BID",
"id": "51444"
},
{
"date": "2012-04-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-001983"
},
{
"date": "2012-04-02T18:55:01.090000",
"db": "NVD",
"id": "CVE-2012-0222"
},
{
"date": "1900-01-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201201-287"
},
{
"date": "2012-04-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201204-004"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-01-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"date": "2012-01-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"date": "2012-04-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-8874"
},
{
"date": "2012-04-03T00:00:00",
"db": "VULHUB",
"id": "VHN-53503"
},
{
"date": "2012-03-28T22:10:00",
"db": "BID",
"id": "51444"
},
{
"date": "2012-04-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-001983"
},
{
"date": "2012-04-03T04:00:00",
"db": "NVD",
"id": "CVE-2012-0222"
},
{
"date": "2012-01-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201201-287"
},
{
"date": "2012-04-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201204-004"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201201-287"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-004"
}
],
"trust": 1.2
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rockwell Automation Allen-Bradley FactoryTalk Buffer Overflow Vulnerability",
"sources": [
{
"db": "IVD",
"id": "7d70a8d0-463f-11e9-be91-000c29342cb1"
},
{
"db": "IVD",
"id": "f9f79006-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-8874"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-004"
}
],
"trust": 1.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow",
"sources": [
{
"db": "IVD",
"id": "7d70a8d0-463f-11e9-be91-000c29342cb1"
},
{
"db": "IVD",
"id": "f9f79006-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-004"
}
],
"trust": 1.0
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…