CVE-2012-4691

Published Dec 18, 2012

Last updated 12 years ago

Overview

Description
Memory leak in Siemens Automation License Manager (ALM) 4.x and 5.x before 5.2 allows remote attackers to cause a denial of service (memory consumption) via crafted packets.
Source
ics-cert@hq.dhs.gov
NVD status
Analyzed

Risk scores

CVSS 2.0

Type
Primary
Base score
3.3
Impact score
2.9
Exploitability score
6.5
Vector string
AV:A/AC:L/Au:N/C:N/I:N/A:P

Weaknesses

nvd@nist.gov
CWE-399

Social media

Hype score
Not currently trending

Evaluator

Comment
-
Impact
Per: http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-783261.pdf "The attacker must have access to the local subnet where ALM is located. During installation, the default setting of the Windows firewall is to block the port used by ALM for all networks except the local subnet. If this setting has not been changed by the administrator, these vulnerabilities cannot be exploited from remote networks. Additionally, communication to this port should be blocked at network borders using appropriate security measures like firewalls."
Solution
Per: http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-783261.pdf "The attacker must have access to the local subnet where ALM is located. During installation, the default setting of the Windows firewall is to block the port used by ALM for all networks except the local subnet. If this setting has not been changed by the administrator, these vulnerabilities cannot be exploited from remote networks. Additionally, communication to this port should be blocked at network borders using appropriate security measures like firewalls."

Configurations