cvelist/2017/11xxx/CVE-2017-11401.json

68 lines
2.1 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2017-11401",
2017-11-20 10:02:38 -05:00
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
2017-10-16 12:31:07 -04:00
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
2017-11-20 10:02:38 -05:00
"value" : "An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. Improper handling of the mbap.length field of ModBus packets in the ModBus DPI filter allows an attacker to send malformed/crafted packets to a protected asset, bypassing function code filtering."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://github.com/airbus-seclab/security-advisories/blob/master/belden/tofino.txt",
"refsource" : "MISC",
2017-11-20 10:02:38 -05:00
"url" : "https://github.com/airbus-seclab/security-advisories/blob/master/belden/tofino.txt"
},
{
"name" : "https://www.belden.com/hubfs/support/security/bulletins/Belden-Security-Bulletin-BSECV-2017-14-1v1-1.pdf",
"refsource" : "MISC",
2017-11-20 10:02:38 -05:00
"url" : "https://www.belden.com/hubfs/support/security/bulletins/Belden-Security-Bulletin-BSECV-2017-14-1v1-1.pdf"
2017-10-16 12:31:07 -04:00
}
]
}
}