VAR-201705-3750

Vulnerability from variot - Updated: 2023-12-18 13:53

All versions of VAMPSET software produced by Schneider Electric, prior to V2.2.189, are susceptible to a memory corruption vulnerability when a corrupted vf2 file is used. This vulnerability causes the software to halt or not start when trying to open the corrupted file. This vulnerability occurs when fill settings are intentionally malformed and is opened in a standalone state, without connection to a protection relay. This attack is not considered to be remotely exploitable. This vulnerability has no effect on the operation of the protection relay to which VAMPSET is connected. As Windows operating system remains operational and VAMPSET responds, it is able to be shut down through its normal closing protocol. Schneider Electric VAMPSET Software contains a buffer error vulnerability.Denial of service (DoS) May be in a state. Schneider Electric VAMPSET is a software company from Schneider Electric, France, deployed in the energy industry to configure and maintain multiple relays and arc monitors. An attacker could exploit this vulnerability to execute arbitrary code in the context of the user running the affected application. Lead to a denial of service condition. Failed exploit attempts will likely cause denial-of-service conditions

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201705-3750",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "vampset",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "2.2.185"
      },
      {
        "model": "vampset",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "2.2.189"
      },
      {
        "model": "electric vampset",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "v2.2.189"
      },
      {
        "model": "electric vampset",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "2.2.145"
      },
      {
        "model": "electric vampset",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "2.2.136"
      },
      {
        "model": "vampset",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider electric",
        "version": "2.2.185"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "vampset",
        "version": "*"
      },
      {
        "model": "vampset",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "2.2.145"
      },
      {
        "model": "vampset",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "2.2.136"
      },
      {
        "model": "vampset",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "2.2.189"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
      },
      {
        "db": "IVD",
        "id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06423"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05641"
      },
      {
        "db": "BID",
        "id": "97124"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003998"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7967"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-901"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:schneider-electric:vampset:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.2.185",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-7967"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kushal Arvind Shah from Fortinet\u0027s Fortiguard Labs.",
    "sources": [
      {
        "db": "BID",
        "id": "97124"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-7967",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 2.1,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2017-7967",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 5.7,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.1,
            "id": "CNVD-2017-06423",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.4,
            "id": "CNVD-2017-05641",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 5.7,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.1,
            "id": "89ad9c93-eb8e-463a-8758-eb5258ca9069",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.4,
            "id": "753ccabe-b440-4a3a-a6ad-9bb292467d05",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "VHN-116170",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.8,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 5.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2017-7967",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2017-7967",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-06423",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-05641",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201704-901",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "IVD",
            "id": "89ad9c93-eb8e-463a-8758-eb5258ca9069",
            "trust": 0.2,
            "value": "LOW"
          },
          {
            "author": "IVD",
            "id": "753ccabe-b440-4a3a-a6ad-9bb292467d05",
            "trust": 0.2,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-116170",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
      },
      {
        "db": "IVD",
        "id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06423"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05641"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116170"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003998"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7967"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-901"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "All versions of VAMPSET software produced by Schneider Electric, prior to V2.2.189, are susceptible to a memory corruption vulnerability when a corrupted vf2 file is used. This vulnerability causes the software to halt or not start when trying to open the corrupted file. This vulnerability occurs when fill settings are intentionally malformed and is opened in a standalone state, without connection to a protection relay. This attack is not considered to be remotely exploitable. This vulnerability has no effect on the operation of the protection relay to which VAMPSET is connected. As Windows operating system remains operational and VAMPSET responds, it is able to be shut down through its normal closing protocol. Schneider Electric VAMPSET Software contains a buffer error vulnerability.Denial of service (DoS) May be in a state. Schneider Electric VAMPSET is a software company from Schneider Electric, France, deployed in the energy industry to configure and maintain multiple relays and arc monitors. An attacker could exploit this vulnerability to execute arbitrary code in the context of the user running the affected application. Lead to a denial of service condition. Failed exploit attempts will likely cause denial-of-service conditions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-7967"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003998"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06423"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05641"
      },
      {
        "db": "BID",
        "id": "97124"
      },
      {
        "db": "IVD",
        "id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
      },
      {
        "db": "IVD",
        "id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116170"
      }
    ],
    "trust": 3.42
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-7967",
        "trust": 3.8
      },
      {
        "db": "SCHNEIDER",
        "id": "SEVD-2017-061-01",
        "trust": 2.6
      },
      {
        "db": "BID",
        "id": "97124",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-901",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06423",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05641",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003998",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-136-04",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "89AD9C93-EB8E-463A-8758-EB5258CA9069",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "753CCABE-B440-4A3A-A6AD-9BB292467D05",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-116170",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
      },
      {
        "db": "IVD",
        "id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06423"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05641"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116170"
      },
      {
        "db": "BID",
        "id": "97124"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003998"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7967"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-901"
      }
    ]
  },
  "id": "VAR-201705-3750",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
      },
      {
        "db": "IVD",
        "id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06423"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05641"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116170"
      }
    ],
    "trust": 2.521428565
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.6
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
      },
      {
        "db": "IVD",
        "id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06423"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05641"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:53:01.074000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SEVD-2017-061-01",
        "trust": 0.8,
        "url": "http://download.schneider-electric.com/files?p_endoctype=technical+leaflet\u0026p_file_id=7289882651\u0026p_file_name=sevd-2017-061-01+vampset.pdf\u0026p_reference=sevd-2017-061-01"
      },
      {
        "title": "Schneider Electric VAMPSET Memory Corruption Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/93552"
      },
      {
        "title": "Schneider Electric VAMPSET Patch for Local Memory Corruption Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/92942"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-06423"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003998"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-116170"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003998"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7967"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://www.schneider-electric.com/en/download/document/sevd-2017-061-01/"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/97124"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7967"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7967"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/97124/info"
      },
      {
        "trust": 0.3,
        "url": "http://www.schneider-electric.com/products/ww/en/"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-136-04"
      },
      {
        "trust": 0.3,
        "url": "http://download.schneider-electric.com/files?p_endoctype=technical+leaflet\u0026p_file_id=6595887732\u0026p_file_name=sevd-2017-061-01+vampset.pdf\u0026p_reference=sevd-2017-061-01"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-06423"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05641"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116170"
      },
      {
        "db": "BID",
        "id": "97124"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003998"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7967"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-901"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
      },
      {
        "db": "IVD",
        "id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06423"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05641"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116170"
      },
      {
        "db": "BID",
        "id": "97124"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003998"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7967"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-901"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-05-13T00:00:00",
        "db": "IVD",
        "id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
      },
      {
        "date": "2017-04-29T00:00:00",
        "db": "IVD",
        "id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
      },
      {
        "date": "2017-05-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-06423"
      },
      {
        "date": "2017-04-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-05641"
      },
      {
        "date": "2017-05-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-116170"
      },
      {
        "date": "2017-03-02T00:00:00",
        "db": "BID",
        "id": "97124"
      },
      {
        "date": "2017-06-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-003998"
      },
      {
        "date": "2017-05-09T17:29:00.213000",
        "db": "NVD",
        "id": "CVE-2017-7967"
      },
      {
        "date": "2017-04-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201704-901"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-05-14T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-06423"
      },
      {
        "date": "2017-04-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-05641"
      },
      {
        "date": "2017-05-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-116170"
      },
      {
        "date": "2017-05-23T16:26:00",
        "db": "BID",
        "id": "97124"
      },
      {
        "date": "2017-06-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-003998"
      },
      {
        "date": "2017-05-23T01:29:03.443000",
        "db": "NVD",
        "id": "CVE-2017-7967"
      },
      {
        "date": "2017-05-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201704-901"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "97124"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-901"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Schneider Electric VAMPSET Local Memory Corruption Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05641"
      },
      {
        "db": "BID",
        "id": "97124"
      }
    ],
    "trust": 1.1
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "89ad9c93-eb8e-463a-8758-eb5258ca9069"
      },
      {
        "db": "IVD",
        "id": "753ccabe-b440-4a3a-a6ad-9bb292467d05"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-901"
      }
    ],
    "trust": 1.0
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…