Lucene search

K
cve[email protected]CVE-2012-4353
HistoryOct 03, 2022 - 4:15 p.m.

CVE-2012-4353

2022-10-0316:15:34
CWE-119
web.nvd.nist.gov
22
cve-2012-4353
stack-based buffer overflow
sielco sistemi winlog pro scada
remote code execution
tcp packet
vulnerability

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8 High

AI Score

Confidence

Low

0.796 High

EPSS

Percentile

98.3%

Stack-based buffer overflow in RunTime.exe in Sielco Sistemi Winlog Pro SCADA before 2.07.17 and Winlog Lite SCADA before 2.07.17 allows remote attackers to execute arbitrary code via a crafted port-46824 TCP packet that triggers an incorrect file-open attempt by the _TCPIPS_BinOpenFileFP function, a different vulnerability than CVE-2012-3815. NOTE: some of these details are obtained from third party information.

Affected configurations

NVD
Node
sielcosistemiwinlog_proRange2.07.16
OR
sielcosistemiwinlog_proMatch2.06.00
OR
sielcosistemiwinlog_proMatch2.06.03
OR
sielcosistemiwinlog_proMatch2.06.04
OR
sielcosistemiwinlog_proMatch2.06.06
OR
sielcosistemiwinlog_proMatch2.06.09
OR
sielcosistemiwinlog_proMatch2.06.10
OR
sielcosistemiwinlog_proMatch2.06.12
OR
sielcosistemiwinlog_proMatch2.06.13
OR
sielcosistemiwinlog_proMatch2.06.14
OR
sielcosistemiwinlog_proMatch2.06.18
OR
sielcosistemiwinlog_proMatch2.06.21
OR
sielcosistemiwinlog_proMatch2.06.24
OR
sielcosistemiwinlog_proMatch2.06.25
OR
sielcosistemiwinlog_proMatch2.06.28
OR
sielcosistemiwinlog_proMatch2.06.40
OR
sielcosistemiwinlog_proMatch2.06.46
OR
sielcosistemiwinlog_proMatch2.06.50
OR
sielcosistemiwinlog_proMatch2.06.60
OR
sielcosistemiwinlog_proMatch2.06.73
OR
sielcosistemiwinlog_proMatch2.06.86
OR
sielcosistemiwinlog_proMatch2.07.00
OR
sielcosistemiwinlog_proMatch2.07.01
OR
sielcosistemiwinlog_proMatch2.07.08
OR
sielcosistemiwinlog_proMatch2.07.09
OR
sielcosistemiwinlog_proMatch2.07.11
OR
sielcosistemiwinlog_proMatch2.07.14
Node
sielcosistemiwinlog_liteRange2.07.16
OR
sielcosistemiwinlog_liteMatch2.06.00
OR
sielcosistemiwinlog_liteMatch2.06.03
OR
sielcosistemiwinlog_liteMatch2.06.04
OR
sielcosistemiwinlog_liteMatch2.06.06
OR
sielcosistemiwinlog_liteMatch2.06.09
OR
sielcosistemiwinlog_liteMatch2.06.10
OR
sielcosistemiwinlog_liteMatch2.06.12
OR
sielcosistemiwinlog_liteMatch2.06.13
OR
sielcosistemiwinlog_liteMatch2.06.14
OR
sielcosistemiwinlog_liteMatch2.06.18
OR
sielcosistemiwinlog_liteMatch2.06.21
OR
sielcosistemiwinlog_liteMatch2.06.24
OR
sielcosistemiwinlog_liteMatch2.06.25
OR
sielcosistemiwinlog_liteMatch2.06.28
OR
sielcosistemiwinlog_liteMatch2.06.40
OR
sielcosistemiwinlog_liteMatch2.06.46
OR
sielcosistemiwinlog_liteMatch2.06.50
OR
sielcosistemiwinlog_liteMatch2.06.60
OR
sielcosistemiwinlog_liteMatch2.06.73
OR
sielcosistemiwinlog_liteMatch2.06.86
OR
sielcosistemiwinlog_liteMatch2.07.00
OR
sielcosistemiwinlog_liteMatch2.07.01
OR
sielcosistemiwinlog_liteMatch2.07.08
OR
sielcosistemiwinlog_liteMatch2.07.09
OR
sielcosistemiwinlog_liteMatch2.07.11
OR
sielcosistemiwinlog_liteMatch2.07.14

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8 High

AI Score

Confidence

Low

0.796 High

EPSS

Percentile

98.3%