VAR-201310-0636
Vulnerability from variot - Updated: 2022-05-17 02:04This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cogent DataHub. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of POST requests. By sending a malformed POST, an attacker is able to overflow a heap buffer. An attacker could exploit this vulnerability to execute arbitrary code in the context of the DataHub process. Cogent Real-Time Systems Cogent DataHub is a set of real-time data solutions from Canada's Cogent Real-Time Systems. It belongs to SCADA (Data Acquisition and Monitoring Control System) and automation software. A denial of service vulnerability exists in versions of Cogent DataHub prior to 7.3.4. An attacker could use this vulnerability to crash the server and deny legitimate users. Failed exploit attempts will likely result in denial-of-service conditions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201310-0636",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "datahub",
"scope": null,
"trust": 0.7,
"vendor": "cogent real time",
"version": null
},
{
"model": "real-time systems cogent datahub",
"scope": "lt",
"trust": 0.6,
"vendor": "cogent",
"version": "7.3.4"
},
{
"model": "real-time systems",
"scope": "eq",
"trust": 0.2,
"vendor": "cogent",
"version": "*"
},
{
"model": "datahub",
"scope": "lt",
"trust": 0.2,
"vendor": "cogent",
"version": "7.3.4"
}
],
"sources": [
{
"db": "IVD",
"id": "b973b25a-1f00-11e6-abef-000c29c66e3d"
},
{
"db": "ZDI",
"id": "ZDI-13-252"
},
{
"db": "CNVD",
"id": "CNVD-2013-14172"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Pawel Wylecial",
"sources": [
{
"db": "ZDI",
"id": "ZDI-13-252"
},
{
"db": "BID",
"id": "63397"
},
{
"db": "CNNVD",
"id": "CNNVD-201310-689"
}
],
"trust": 1.6
},
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "ZDI-13-252",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 0.7,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2013-14172",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "b973b25a-1f00-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
}
],
"cvssV3": [],
"severity": [
{
"author": "ZDI",
"id": "ZDI-13-252",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2013-14172",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "b973b25a-1f00-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "b973b25a-1f00-11e6-abef-000c29c66e3d"
},
{
"db": "ZDI",
"id": "ZDI-13-252"
},
{
"db": "CNVD",
"id": "CNVD-2013-14172"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cogent DataHub. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of POST requests. By sending a malformed POST, an attacker is able to overflow a heap buffer. An attacker could exploit this vulnerability to execute arbitrary code in the context of the DataHub process. Cogent Real-Time Systems Cogent DataHub is a set of real-time data solutions from Canada\u0027s Cogent Real-Time Systems. It belongs to SCADA (Data Acquisition and Monitoring Control System) and automation software. \nA denial of service vulnerability exists in versions of Cogent DataHub prior to 7.3.4. An attacker could use this vulnerability to crash the server and deny legitimate users. Failed exploit attempts will likely result in denial-of-service conditions",
"sources": [
{
"db": "ZDI",
"id": "ZDI-13-252"
},
{
"db": "CNVD",
"id": "CNVD-2013-14172"
},
{
"db": "CNNVD",
"id": "CNNVD-201310-689"
},
{
"db": "BID",
"id": "63397"
},
{
"db": "IVD",
"id": "b973b25a-1f00-11e6-abef-000c29c66e3d"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "63397",
"trust": 1.5
},
{
"db": "ZDI",
"id": "ZDI-13-252",
"trust": 1.0
},
{
"db": "CNVD",
"id": "CNVD-2013-14172",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-1981",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201310-689",
"trust": 0.6
},
{
"db": "IVD",
"id": "B973B25A-1F00-11E6-ABEF-000C29C66E3D",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "b973b25a-1f00-11e6-abef-000c29c66e3d"
},
{
"db": "ZDI",
"id": "ZDI-13-252"
},
{
"db": "CNVD",
"id": "CNVD-2013-14172"
},
{
"db": "BID",
"id": "63397"
},
{
"db": "CNNVD",
"id": "CNNVD-201310-689"
}
]
},
"id": "VAR-201310-0636",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "b973b25a-1f00-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-14172"
}
],
"trust": 1.5661290300000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "b973b25a-1f00-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-14172"
}
]
},
"last_update_date": "2022-05-17T02:04:40.400000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Cogent Real-Time Systems has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "http://www.cogentdatahub.com/download_software.html"
},
{
"title": "Cogent DataHub denial of service vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/40621"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-13-252"
},
{
"db": "CNVD",
"id": "CNVD-2013-14172"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.2,
"url": "http://www.securityfocus.com/bid/63397"
},
{
"trust": 0.7,
"url": "http://www.cogentdatahub.com/download_software.html"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-13-252/"
},
{
"trust": 0.3,
"url": "http://www.cogentdatahub.com/index.html"
},
{
"trust": 0.3,
"url": "http://www.cogentdatahub.com/releasenotes.html"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-13-252"
},
{
"db": "CNVD",
"id": "CNVD-2013-14172"
},
{
"db": "BID",
"id": "63397"
},
{
"db": "CNNVD",
"id": "CNNVD-201310-689"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "b973b25a-1f00-11e6-abef-000c29c66e3d"
},
{
"db": "ZDI",
"id": "ZDI-13-252"
},
{
"db": "CNVD",
"id": "CNVD-2013-14172"
},
{
"db": "BID",
"id": "63397"
},
{
"db": "CNNVD",
"id": "CNNVD-201310-689"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-10-31T00:00:00",
"db": "IVD",
"id": "b973b25a-1f00-11e6-abef-000c29c66e3d"
},
{
"date": "2013-11-24T00:00:00",
"db": "ZDI",
"id": "ZDI-13-252"
},
{
"date": "2013-10-31T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-14172"
},
{
"date": "2013-10-29T00:00:00",
"db": "BID",
"id": "63397"
},
{
"date": "2013-10-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201310-689"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-11-24T00:00:00",
"db": "ZDI",
"id": "ZDI-13-252"
},
{
"date": "2013-10-31T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-14172"
},
{
"date": "2015-03-19T09:30:00",
"db": "BID",
"id": "63397"
},
{
"date": "2013-10-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201310-689"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201310-689"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cogent DataHub Denial of service vulnerability",
"sources": [
{
"db": "IVD",
"id": "b973b25a-1f00-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-14172"
},
{
"db": "CNNVD",
"id": "CNNVD-201310-689"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input Validation Error",
"sources": [
{
"db": "BID",
"id": "63397"
}
],
"trust": 0.3
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.