René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

148 lines
4.7 KiB
JSON

{
"id": "CVE-2007-1319",
"sourceIdentifier": "cret@cert.org",
"published": "2007-03-19T22:19:00.000",
"lastModified": "2018-10-16T16:37:56.250",
"vulnStatus": "Modified",
"evaluatorSolution": "This vulnerability is addressed in the following product update: http://www.faweb.net/us/opc/1231207.html",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the IOPCServer::RemoveGroup function in the OPCDA interface in Takebishi Electric DeviceXPlorer OLE for Process Control (OPC) Server before 3.12 Build3 allows remote attackers to execute arbitrary code via unspecified vectors involving access to arbitrary memory. NOTE: this issue affects the (1) HIDIC, (2) MELSEC, (3) FA-M3, (4) MODBUS, and (5) SYSMAC OPC Servers."
},
{
"lang": "es",
"value": "Una Vulnerabilidad no especificada en la funci\u00f3n IOPCServer::RemoveGroup en la interfaz OPCDA en Takebishi Electric DeviceXPlorer OLE para Process Control (OPC) Server anterior a versi\u00f3n 3.12 Build3, permite que los atacantes remotos ejecuten c\u00f3digo arbitrario por medio de vectores no especificados que involucren el acceso a la memoria arbitraria. NOTA: este problema impacta a los servidores (1) HIDIC, (2) MELSEC, (3) FA-M3, (4) MODBUS y (5) SYSMAC OPC."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:takebishi_corporation:devicexplorer_opc_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.12_build2",
"matchCriteriaId": "75C6B6A1-CE30-4C10-81FC-BD4C2CB22A53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:takebishi_corporation:devicexplorer_opc_server:3.12_build1:*:*:*:*:*:*:*",
"matchCriteriaId": "8262A7A4-244F-4308-821D-A766E3FC2879"
}
]
}
]
}
],
"references": [
{
"url": "http://www.faweb.net/us/opc/1231207.html",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/926551",
"source": "cret@cert.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.neutralbit.com/advisories/NB07-07.txt",
"source": "cret@cert.org"
},
{
"url": "http://www.neutralbit.com/advisories/NB07-08.txt",
"source": "cret@cert.org"
},
{
"url": "http://www.neutralbit.com/advisories/NB07-09.txt",
"source": "cret@cert.org"
},
{
"url": "http://www.neutralbit.com/advisories/NB07-10.txt",
"source": "cret@cert.org"
},
{
"url": "http://www.neutralbit.com/advisories/NB07-17.txt",
"source": "cret@cert.org"
},
{
"url": "http://www.securityfocus.com/archive/1/463537/100/0/threaded",
"source": "cret@cert.org"
},
{
"url": "http://www.securityfocus.com/archive/1/463546/100/0/threaded",
"source": "cret@cert.org"
},
{
"url": "http://www.securityfocus.com/archive/1/463550/100/0/threaded",
"source": "cret@cert.org"
},
{
"url": "http://www.securityfocus.com/archive/1/463556/100/0/threaded",
"source": "cret@cert.org"
},
{
"url": "http://www.securityfocus.com/archive/1/463559/100/0/threaded",
"source": "cret@cert.org"
},
{
"url": "http://www.securityfocus.com/bid/23037",
"source": "cret@cert.org"
},
{
"url": "http://www.securitytracker.com/id?1017793",
"source": "cret@cert.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/1029",
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
]
}
]
}