2024-07-14 02:06:08 +00:00

108 lines
3.5 KiB
JSON

{
"id": "CVE-2007-4473",
"sourceIdentifier": "cret@cert.org",
"published": "2007-12-17T21:46:00.000",
"lastModified": "2017-07-29T01:32:57.787",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Gesytec Easylon OPC Server before 2.3.44 does not properly validate server handles, which allows remote attackers to execute arbitrary code or cause a denial of service via unspecified network traffic to the OLE for Process Control (OPC) interface, probably related to free operations on arbitrary memory addresses through certain Remove functions, and read and write operations on arbitrary memory addresses through certain Set, Read, and Write functions."
},
{
"lang": "es",
"value": "Gesytec Easylon OPC Server anterior a 2.3.44 no valida adecuadamente manejadores de servidor, lo cual permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar denegaci\u00f3n de servicio a trav\u00e9s de un tr\u00e1fico de red espec\u00edfico en el OLE para las interfaces Process Control (OPC), probablemente relacionado con operaciones libres sobre direcciones de memoria de su elecci\u00f3n a trav\u00e9s de ciertas funciones Remove, y leer y escribir operaciones sobre direcciones de memoria de su elecci\u00f3n a trav\u00e9s de ciertas funciones para asignar, leer y escribir."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gesytec_easylon:opc_server:2.30.32:*:*:*:*:*:*:*",
"matchCriteriaId": "213D3C21-4A3D-411B-B557-5D3C96B6049B"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/42650",
"source": "cret@cert.org"
},
{
"url": "http://secunia.com/advisories/28079",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/205073",
"source": "cret@cert.org",
"tags": [
"Patch",
"US Government Resource"
]
},
{
"url": "http://www.neutralbit.com/downloads/NB-NB-001-EXT-OPC%20Security%20Testing.pdf",
"source": "cret@cert.org"
},
{
"url": "http://www.neutralbit.com/en/rd/opctest/",
"source": "cret@cert.org"
},
{
"url": "http://www.securityfocus.com/bid/26876",
"source": "cret@cert.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39062",
"source": "cret@cert.org"
}
]
}