var-201403-0445
Vulnerability from variot

Heap-based buffer overflow in BKCLogSvr.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via crafted UDP packets. Yokogawa CENTUM CS 3000 is a new generation of distributed control system, DCS system with WINDOWS XP as the operating platform. When the Yokogawa CENTUM CS 3000 processes the inbound message, the modules \"BKCLogSvr.exe\", \"BKHOdeq.exe\", \"BKBCopyD.exe\" have errors, and the malicious user sends the message to UDP port 52302, TCP port 20171, TCP port 20111. A specially crafted packet that an attacker can exploit to cause a heap buffer overflow. Yokogawa CENTUM CS3000 is prone to a heap-based buffer-overflow vulnerability. Successful exploits will allow attackers to crash the affected application, resulting in a denial-of-service condition. Due to the nature of this issue, code execution is also possible. Yokogawa CENTUM CS3000 R3.08.50 is vulnerable; other versions may also be affected. Yokogawa CENTUM CS is a set of large-scale production control system of Japan Yokogawa Electric Corporation (Yokogawa). The system is mainly used in multi-field factories

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201403-0445",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "centum cs 3000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "yokogawa",
        "version": "r3.07"
      },
      {
        "model": "centum cs 3000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "yokogawa",
        "version": "r3.08.70"
      },
      {
        "model": "centum cs 3000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "yokogawa",
        "version": "r3.04"
      },
      {
        "model": "centum cs 3000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "yokogawa",
        "version": "r3.08"
      },
      {
        "model": "centum cs 3000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "yokogawa",
        "version": "r3.08.50"
      },
      {
        "model": "centum cs 3000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "yokogawa",
        "version": "r3.09"
      },
      {
        "model": "centum cs 3000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "yokogawa",
        "version": "r3.05"
      },
      {
        "model": "centum cs 3000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "yokogawa",
        "version": "r3.06"
      },
      {
        "model": "centum cs 3000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "yokogawa",
        "version": "r3.03"
      },
      {
        "model": "centum cs 3000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yokogawa",
        "version": "r3.02"
      },
      {
        "model": "centum cs 3000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yokogawa",
        "version": "r3.01"
      },
      {
        "model": "centum cs 3000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "yokogawa",
        "version": "r3.09.50"
      },
      {
        "model": "centum cs 3000 software",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "yokogawa electric",
        "version": "r3.09.50"
      },
      {
        "model": "centum cs3000 r3.09.50",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "yokogawa electric",
        "version": "\u003c="
      },
      {
        "model": "centum cs 3000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "yokogawa",
        "version": "r3.09.50"
      },
      {
        "model": "r3.01",
        "scope": null,
        "trust": 0.2,
        "vendor": "centum cs 3000",
        "version": null
      },
      {
        "model": "r3.02",
        "scope": null,
        "trust": 0.2,
        "vendor": "centum cs 3000",
        "version": null
      },
      {
        "model": "r3.03",
        "scope": null,
        "trust": 0.2,
        "vendor": "centum cs 3000",
        "version": null
      },
      {
        "model": "r3.04",
        "scope": null,
        "trust": 0.2,
        "vendor": "centum cs 3000",
        "version": null
      },
      {
        "model": "r3.05",
        "scope": null,
        "trust": 0.2,
        "vendor": "centum cs 3000",
        "version": null
      },
      {
        "model": "r3.06",
        "scope": null,
        "trust": 0.2,
        "vendor": "centum cs 3000",
        "version": null
      },
      {
        "model": "r3.07",
        "scope": null,
        "trust": 0.2,
        "vendor": "centum cs 3000",
        "version": null
      },
      {
        "model": "r3.08",
        "scope": null,
        "trust": 0.2,
        "vendor": "centum cs 3000",
        "version": null
      },
      {
        "model": "r3.08.50",
        "scope": null,
        "trust": 0.2,
        "vendor": "centum cs 3000",
        "version": null
      },
      {
        "model": "r3.08.70",
        "scope": null,
        "trust": 0.2,
        "vendor": "centum cs 3000",
        "version": null
      },
      {
        "model": "r3.09",
        "scope": null,
        "trust": 0.2,
        "vendor": "centum cs 3000",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "centum cs 3000",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "285cd4bc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01753"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001654"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0781"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-251"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.02:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.01:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.09:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.70:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.50:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.08:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.07:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.06:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.04:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:yokogawa:centum_cs_3000:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "r3.09.50",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.05:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.03:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-0781"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "juan vazquez",
    "sources": [
      {
        "db": "BID",
        "id": "66130"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-0781",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 9.3,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2014-0781",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2014-01753",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "285cd4bc-2352-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "VHN-68274",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-0781",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-01753",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201403-251",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "285cd4bc-2352-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-68274",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "285cd4bc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01753"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68274"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001654"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0781"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-251"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Heap-based buffer overflow in BKCLogSvr.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via crafted UDP packets. Yokogawa CENTUM CS 3000 is a new generation of distributed control system, DCS system with WINDOWS XP as the operating platform. When the Yokogawa CENTUM CS 3000 processes the inbound message, the modules \\\"BKCLogSvr.exe\\\", \\\"BKHOdeq.exe\\\", \\\"BKBCopyD.exe\\\" have errors, and the malicious user sends the message to UDP port 52302, TCP port 20171, TCP port 20111. A specially crafted packet that an attacker can exploit to cause a heap buffer overflow. Yokogawa CENTUM CS3000 is prone to a heap-based buffer-overflow  vulnerability. \nSuccessful exploits will allow attackers to crash the affected application, resulting in a denial-of-service condition. Due to the nature of this issue, code execution is also possible. \nYokogawa CENTUM CS3000 R3.08.50 is vulnerable; other versions may also be affected. Yokogawa CENTUM CS is a set of large-scale production control system of Japan Yokogawa Electric Corporation (Yokogawa). The system is mainly used in multi-field factories",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-0781"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001654"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01753"
      },
      {
        "db": "BID",
        "id": "66130"
      },
      {
        "db": "IVD",
        "id": "285cd4bc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68274"
      }
    ],
    "trust": 2.7
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-68274",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-68274"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-0781",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-070-01",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "66130",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-251",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01753",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-133-01",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU98181377",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001654",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "57303",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "26255",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "285CD4BC-2352-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-68274",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "285cd4bc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01753"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68274"
      },
      {
        "db": "BID",
        "id": "66130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001654"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0781"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-251"
      }
    ]
  },
  "id": "VAR-201403-0445",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "285cd4bc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01753"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68274"
      }
    ],
    "trust": 1.9
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "285cd4bc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01753"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:21:23.689000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "YSAR-14-0001: CENTUM \u3092\u542b\u3080 YOKOGAWA \u88fd\u54c1\u306b\u8907\u6570\u306e\u30d0\u30c3\u30d5\u30a1\u30aa\u30fc\u30d0\u30fc\u30d5\u30ed\u30fc\u306e\u8106\u5f31\u6027",
        "trust": 0.8,
        "url": "http://www.yokogawa.co.jp/dcs/security/ysar/ysar-14-0001.pdf"
      },
      {
        "title": "Patch for Yokogawa CENTUM CS Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/44339"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-01753"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001654"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-68274"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001654"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0781"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-070-01"
      },
      {
        "trust": 1.4,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0781"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/66130"
      },
      {
        "trust": 1.1,
        "url": "https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0781"
      },
      {
        "trust": 0.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-14-133-01"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu98181377/index.html"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/57303"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/26255"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-01753"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68274"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001654"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0781"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-251"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "285cd4bc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01753"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68274"
      },
      {
        "db": "BID",
        "id": "66130"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001654"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0781"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-251"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-03-18T00:00:00",
        "db": "IVD",
        "id": "285cd4bc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2014-03-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-01753"
      },
      {
        "date": "2014-03-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-68274"
      },
      {
        "date": "2014-03-11T00:00:00",
        "db": "BID",
        "id": "66130"
      },
      {
        "date": "2014-03-17T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001654"
      },
      {
        "date": "2014-03-14T10:55:05.817000",
        "db": "NVD",
        "id": "CVE-2014-0781"
      },
      {
        "date": "2014-03-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201403-251"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-07-07T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-01753"
      },
      {
        "date": "2015-08-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-68274"
      },
      {
        "date": "2014-10-13T00:01:00",
        "db": "BID",
        "id": "66130"
      },
      {
        "date": "2014-05-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001654"
      },
      {
        "date": "2015-08-05T15:45:09.840000",
        "db": "NVD",
        "id": "CVE-2014-0781"
      },
      {
        "date": "2014-03-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201403-251"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-251"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Yokogawa CENTUM CS Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "285cd4bc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01753"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "285cd4bc-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-251"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.