mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
109 lines
3.7 KiB
JSON
109 lines
3.7 KiB
JSON
{
|
|
"id": "CVE-2008-2474",
|
|
"sourceIdentifier": "cret@cert.org",
|
|
"published": "2008-09-29T17:17:29.050",
|
|
"lastModified": "2018-10-11T20:41:41.317",
|
|
"vulnStatus": "Modified",
|
|
"evaluatorSolution": "This issue is corrected in version 3.5.5 of the x87 executable. To obtain a patch or upgrade software please contact your vendor. The x87 executable is considered obsolete in newer versions of the PCU 400 and should be replaced\r\nby the newer x88 or x89 executable where applicable.\r\n\r\nLink to contact information: http://www.abb.com/industries/db0003db004333/c12573e7003305cbc1257074003d0702.aspx?productLanguage=us&country=US&tabKey=Contacts",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Buffer overflow in x87 before 3.5.5 in ABB Process Communication Unit 400 (PCU400) 4.4 through 4.6 allows remote attackers to execute arbitrary code via a crafted packet using the (1) IEC60870-5-101 or (2) IEC60870-5-104 communication protocol to the X87 web interface."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Desbordamiento de b\u00fafer en x87 anteriores a v3.5.5 en ABB Process Comunicati\u00f3n Unit 400 (PCU400) v4.4 hasta v4.6, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un paquete manipulado utilizando los protocolos de comunicaci\u00f3n (1)IEC60870-5-101 o (2) IEC60870-5-104 para el interfaz web del X87."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:abb:pcu400:4.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "053989DE-274C-4000-83E2-3B6BB13C72A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:abb:pcu400:4.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7F189832-AAE9-467D-ACC0-F1DD81C1DA5E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:abb:pcu400:4.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50B1D03E-E73B-4759-A841-CEBE6CA7F4F8"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securityreason.com/securityalert/4320",
|
|
"source": "cret@cert.org"
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/343971",
|
|
"source": "cret@cert.org",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/CTAR-7JTNRX",
|
|
"source": "cret@cert.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/496739/100/0/threaded",
|
|
"source": "cret@cert.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/31391",
|
|
"source": "cret@cert.org"
|
|
}
|
|
]
|
|
} |