Lucene search

K
nessusThis script is Copyright (C) 2013-2024 and is owned by Tenable, Inc. or an Affiliate thereof.SCADA_SIEMENS_ALM_SSA_319258.NBIN
HistoryJan 09, 2013 - 12:00 a.m.

Siemens Automation License Manager Multiple Vulnerabilities

2013-01-0900:00:00
This script is Copyright (C) 2013-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
16

The remote host has a version of Siemens Automation License Manager installed that is affected by the following vulnerabilities :

  • There are multiple buffer overflows that can be exploited to execute arbitrary code by sending a message to the Automation License Manager TCP service listening on port 4410 containing a long serialid field in a
    _licensekey command. (CVE-2011-4329)

  • The Siemens Automation License Manager TCP service listening on TCP port 4410 does not properly copy fields obtained from clients and can be exploited by sending a message containing long fields to cause a denial of service. (CVE-2011-4530)

  • By sending a specially crafted ‘get_target_ocx_param’ or ‘send_target_ocx_param’ command message to the Automation License Manager service listening on port 4410, an attacker can trigger a NULL pointer dereference and denial of service. (CVE-2011-4531)

Binary data scada_siemens_alm_ssa_319258.nbin
VendorProductVersionCPE
siemensautomation_license_managercpe:/a:siemens:automation_license_manager
Related for SCADA_SIEMENS_ALM_SSA_319258.NBIN