CVE-2012-3007
Published Jul 5, 2012
Last updated 12 years ago
Overview
- Description
- Stack-based buffer overflow in slssvc.exe before 58.x in Invensys Wonderware SuiteLink in the Invensys System Platform software suite, as used in InTouch/Wonderware Application Server IT before 10.5 and WAS before 3.5, DASABCIP before 4.1 SP2, DASSiDirect before 3.0, DAServer Runtime Components before 3.0 SP2, and other products, allows remote attackers to cause a denial of service (daemon crash or hang) via a long Unicode string.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:invensys:dasabcip:*:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3441E270-D814-45F3-86C1-C67F418C9B83", "versionEndIncluding": "4.1" }, { "criteria": "cpe:2.3:a:invensys:dasabcip:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E84BEFDA-22B6-4F5E-A7EF-C4B9DA44C6B0" }, { "criteria": "cpe:2.3:a:invensys:daserver_runtime_components:*:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AC1ED0F-D74C-4595-8DF4-C9F30895CE15", "versionEndIncluding": "3.0" }, { "criteria": "cpe:2.3:a:invensys:daserver_runtime_components:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FE73143-BDF4-41C3-9D00-C4138FDDA179" }, { "criteria": "cpe:2.3:a:invensys:dassidirect:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18941771-CFCA-4F18-8F2B-7C90F5673AA2", "versionEndIncluding": "2.0" }, { "criteria": "cpe:2.3:a:invensys:intouch\\/wonderware_application_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C28F1AE-E010-4F53-914D-2BCC9FD512C1", "versionEndIncluding": "10.0" }, { "criteria": "cpe:2.3:a:invensys:wonderware_application_server:*:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C53D322C-1D42-479E-9225-40684655F4CA", "versionEndIncluding": "3.1" }, { "criteria": "cpe:2.3:a:invensys:wonderware_application_server:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5EA5956-AFFF-4AF6-8E51-60B702E4E3FD" }, { "criteria": "cpe:2.3:a:invensys:wonderware_application_server:3.0.200:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF2F376E-2D08-4C72-B8DE-DF090A93B637" }, { "criteria": "cpe:2.3:a:invensys:wonderware_application_server:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA9909E3-C0C3-4EE8-A592-948D8F90E569" }, { "criteria": "cpe:2.3:a:invensys:wonderware_application_server:3.1:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2576F8F1-DA43-47E1-95D9-9A9233FCD2B0" }, { "criteria": "cpe:2.3:a:invensys:wonderware_application_server:3.1.201:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40204711-D1E2-4C9A-976B-55DE6FA83A43" } ], "operator": "OR" } ] } ]