cvelist/2022/4xxx/CVE-2022-4857.json
2022-12-30 11:00:35 +00:00

151 lines
6.5 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-4857",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in Modbus Tools Modbus Poll up to 9.10.0 and classified as critical. Affected by this issue is some unknown functionality of the file mbpoll.exe of the component mbp File Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-217022 is the identifier assigned to this vulnerability."
},
{
"lang": "deu",
"value": "Eine Schwachstelle wurde in Modbus Tools Modbus Poll bis 9.10.0 gefunden. Sie wurde als kritisch eingestuft. Dies betrifft einen unbekannten Teil der Datei mbpoll.exe der Komponente mbp File Handler. Durch die Manipulation mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-120 Buffer Overflow",
"cweId": "CWE-120"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Modbus Tools",
"product": {
"product_data": [
{
"product_name": "Modbus Poll",
"version": {
"version_data": [
{
"version_value": "9.0",
"version_affected": "="
},
{
"version_value": "9.1",
"version_affected": "="
},
{
"version_value": "9.2",
"version_affected": "="
},
{
"version_value": "9.3",
"version_affected": "="
},
{
"version_value": "9.4",
"version_affected": "="
},
{
"version_value": "9.5",
"version_affected": "="
},
{
"version_value": "9.6",
"version_affected": "="
},
{
"version_value": "9.7",
"version_affected": "="
},
{
"version_value": "9.8",
"version_affected": "="
},
{
"version_value": "9.9",
"version_affected": "="
},
{
"version_value": "9.10",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.217022",
"refsource": "MISC",
"name": "https://vuldb.com/?id.217022"
},
{
"url": "https://vuldb.com/?ctiid.217022",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.217022"
},
{
"url": "https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/Modbus%20Poll%20(version%209.10.0%20and%20earlier)%20mbp%20file%20has%20a%20buffer%20overflow%20vulnerability.md",
"refsource": "MISC",
"name": "https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/Modbus%20Poll%20(version%209.10.0%20and%20earlier)%20mbp%20file%20has%20a%20buffer%20overflow%20vulnerability.md"
},
{
"url": "https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/poc/poc.mbp",
"refsource": "MISC",
"name": "https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/poc/poc.mbp"
}
]
},
"credits": [
{
"lang": "en",
"value": "webray.com.cn (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 7.5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseSeverity": "HIGH"
}
]
}
}