mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
223 lines
8.1 KiB
JSON
223 lines
8.1 KiB
JSON
{
|
|
"id": "CVE-2011-3996",
|
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
|
"published": "2011-11-03T17:55:01.887",
|
|
"lastModified": "2017-08-29T01:30:26.443",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The LiveData Service in CSWorks before 2.0.4115.1 allows remote attackers to cause a denial of service (service crash) via crafted TCP packets."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El servicio LiveData en CSWorks anteriores a v2.0.4115.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (service crash) a trav\u00e9s de paquetes TCP manipulados."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-399"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.0.4115.0",
|
|
"matchCriteriaId": "F6C8804D-EDF4-420E-88F3-9CC7A6D08C03"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.0.601.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E10DCB21-0871-48B4-973F-644D3D67452A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.0.612.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B6480D5C-87DA-4932-B896-5BCB96BAE93F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.0.623.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "43512F0F-1A2B-40D6-B6D3-BDDA2EB8FE73"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.0.720.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0C20287C-9659-4785-B3E2-0F2384D1DF40"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.0.801.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C86ECDDB-3306-46AC-8BAA-40F5B2CF8B02"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.0.813.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C66BA50E-2BA9-4AF0-8EF8-5ACFB59F0ED4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.0.901.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E06A8C5C-4E93-48C4-9693-E42A6E3C8EFE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.0.3540.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0A7A01C-5E87-42CB-B208-55D8AEF310F5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.0.3560.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "93461758-9E8E-4045-9843-312985E58150"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.0.3580.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "802D62B8-079E-41AA-8780-15E28704CE1F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.1.3600.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E3630EDC-A128-451B-BA13-0EEA227FA670"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.1.3674.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "919FF97B-D940-4560-8F20-948A58699C33"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.1.3700.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09CB258D-FF10-4D7A-96DB-9311D64D62F5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.2.3730.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "55AE952B-1A64-492A-8624-449DCF7CDEA1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.2.3800.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5DA92DB6-626B-4A2A-A784-E914F82592ED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.4.3820.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C109412C-4905-4D4B-835D-E5763A71AFF0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.4.3830.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C094AEA-3025-4EB6-932D-1865A0997FC6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.4.3850.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4F76281B-8C43-4A2F-B2F5-DAEC351C1F63"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.4.3860.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8084E967-B462-4B73-97E0-13A0C8B15372"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.4.3880.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E230326-3DBC-47FD-AF9F-16DB53EB4BDD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.4.3900.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A0570DE-AC7D-4D45-BFEA-FEB4C9564989"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.4.4000.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D8EA92F7-D93A-4615-B9C9-745B0D49F6FD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.7.4050.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C557E7C8-A9F5-4AC7-A79E-62812C80DC74"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:controlsystemworks:csworks:1.7.5000.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "220EB778-E9BB-42B0-ACC5-7EF513D69A67"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://jvn.jp/en/jp/JVN98649286/index.html",
|
|
"source": "vultures@jpcert.or.jp"
|
|
},
|
|
{
|
|
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000095",
|
|
"source": "vultures@jpcert.or.jp"
|
|
},
|
|
{
|
|
"url": "http://www.controlsystemworks.com/ProductHistory.aspx",
|
|
"source": "vultures@jpcert.or.jp"
|
|
},
|
|
{
|
|
"url": "http://www.controlsystemworks.com/blogengine/post/CSWorks-2041151-security-release.aspx",
|
|
"source": "vultures@jpcert.or.jp",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/50458",
|
|
"source": "vultures@jpcert.or.jp"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71079",
|
|
"source": "vultures@jpcert.or.jp"
|
|
}
|
|
]
|
|
} |