CVE-2011-3492 (GCVE-0-2011-3492)
Vulnerability from cvelistv5
Published
2011-09-16 14:00
Modified
2024-08-06 23:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in Azeotech DAQFactory 5.85 build 1853 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted NETB packet to UDP port 20034.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:37:47.705Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "daqfactory-netb-bo(69764)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69764" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.altervista.org/adv/daqfactory_1-adv.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-02.pdf" }, { "name": "17855", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/17855" }, { "name": "75496", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/75496" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Azeotech DAQFactory 5.85 build 1853 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted NETB packet to UDP port 20034." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "daqfactory-netb-bo(69764)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69764" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.altervista.org/adv/daqfactory_1-adv.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-02.pdf" }, { "name": "17855", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/17855" }, { "name": "75496", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/75496" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-3492", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Azeotech DAQFactory 5.85 build 1853 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted NETB packet to UDP port 20034." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "daqfactory-netb-bo(69764)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69764" }, { "name": "http://aluigi.altervista.org/adv/daqfactory_1-adv.txt", "refsource": "MISC", "url": "http://aluigi.altervista.org/adv/daqfactory_1-adv.txt" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-02.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-02.pdf" }, { "name": "17855", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/17855" }, { "name": "75496", "refsource": "OSVDB", "url": "http://osvdb.org/75496" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-3492", "datePublished": "2011-09-16T14:00:00", "dateReserved": "2011-09-16T00:00:00", "dateUpdated": "2024-08-06T23:37:47.705Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-3492\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-09-16T14:28:13.073\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in Azeotech DAQFactory 5.85 build 1853 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted NETB packet to UDP port 20034.\"},{\"lang\":\"es\",\"value\":\"El desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en Azeotech DAQFactory versi\u00f3n 5.85 build 1853 y versiones anteriores, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo) y ejecutar c\u00f3digo arbitrario por medio de un paquete NETB dise\u00f1ado a UDP puerto 20034.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.85\",\"matchCriteriaId\":\"9045A50A-53CC-48AB-97E7-D8DC91A61272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:3.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"8668100E-A3B5-4AEE-A0A5-B9641A931EF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:3.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"350751D6-CE73-45F6-A1E6-1190E153120F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7344A14-3965-4121-9726-3D2950EB0208\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:3.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98AC446B-478A-4217-A25D-33A56C78A75E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:3.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6487E8-6B7A-4C14-A56F-E44965A53264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6097D59F-90E6-43F4-ADB5-5625B1F3B842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"886CDDCF-0D11-44B6-81AD-2A2D4FEBB2E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:3.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDB855B8-CDA4-4591-8F81-90C16B77E0F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:3.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC279BA5-BA45-40E4-8DD1-E80D68B62A94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:3.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5832A1FB-B52F-45D0-BFB7-D01D3FBBE41B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:3.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F682BB82-A06E-4626-8F9E-EB1E7E33DAD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:4.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC6CFBE-239D-4537-A148-355F388F3238\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB0392C0-3319-4AE6-977E-2AED0EDFE9C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5713FDC-5EC8-42EC-BCC8-5C63C5EE6DB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0592195-47A3-4021-854C-C14B867BC39B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C62325DC-8C51-4F8B-A2E3-1EBA516C2AD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"322C54E5-C92D-4456-9229-8D19E9596821\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4F569D3-0295-40A9-829D-37AC9637A53B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65C84BD0-39A2-4B1D-914B-2AACAA107D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD3C28A9-4D2E-4402-B097-B02C87F45D07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBD8C372-9AC0-4CA5-9592-10EAE99B39C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9EF9F51-3CA7-4F05-8873-44EE3F928FBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C21A5E58-059E-49EA-8C4A-5E540D2D020A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86F4D91C-0DEB-474F-8F70-90BBE08B9798\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0075E67F-C2BD-478B-B57B-16B0AAE5804A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A01D03E0-0582-4E89-8A39-8236B86DEE26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4CABD9A-B5F0-4468-8432-33760C280900\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41553AA7-AC2B-4050-ADDA-4462568E09F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D59DE4B-0ADC-4347-BAD9-BDC49A095CE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"462A5DC8-09FB-4A72-A8E9-77B6FDBE8A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BFDAA04-4356-4708-916C-734FE5EC209C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BC97464-46D7-4013-9EFC-2BEFA20A3B95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9EEEC5-2070-4A7D-8485-CF336BFA2AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F55E34B-D91B-4467-B3A6-79397B23BEAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FA3D882-8959-4B24-91DA-7B08BA31B8DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2844056-4AD6-44C2-BD6A-5D4F29E69738\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2395A3-77A7-486A-BD79-50927AC992CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56B9DF59-8444-490D-B0C9-FF4404479CFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6828A7ED-0C8E-49CA-80DC-4C9A1BD4A784\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D055B27F-1715-4A55-B42C-7D278CB94ED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA182CEB-C0F0-46DC-8257-A2CA54FA2E64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.76:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D215554-39F3-429A-81A9-CD4C88C9B093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.77:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CB25924-FE48-4C5E-A6BA-650892B882F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.78:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27B722A9-B97E-4454-960C-C2D91A4C68D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.79:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"418E1467-741F-4286-B966-D451FC0084AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.80:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E817E266-1ED4-4684-B362-0BF0AB0C0B30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.82:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DF2A7A2-A212-4586-8CE9-69A3B762EE8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0DB3955-3C85-49BF-B6B9-026E177974BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.83:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AAA56B9-AC6C-41FA-93B9-9B23B57961CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azeotech:daqfactory:5.84:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BECB5A1A-5510-4B38-B349-D92108047246\"}]}]}],\"references\":[{\"url\":\"http://aluigi.altervista.org/adv/daqfactory_1-adv.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://osvdb.org/75496\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.exploit-db.com/exploits/17855\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-02.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/69764\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://aluigi.altervista.org/adv/daqfactory_1-adv.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://osvdb.org/75496\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.exploit-db.com/exploits/17855\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-02.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/69764\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…