Stack-based buffer overflow in the Profinet DCP protocol implementation on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 allows remote attackers to cause a denial of service (device outage) or possibly execute arbitrary code via a crafted DCP frame.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/81034 - | |
References | () http://support.automation.siemens.com/WW/view/en/59869684 - | |
References | () http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-268149.pdf - Vendor Advisory | |
References | () http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-05.pdf - US Government Resource |
Information
Published : 2012-04-18 10:33
Updated : 2024-11-21 01:37
NVD link : CVE-2012-1800
Mitre link : CVE-2012-1800
CVE.ORG link : CVE-2012-1800
JSON object : View
Products Affected
siemens
- scalance_s612
- scalance_s613
- scalance_s602
- scalance_s_firmware
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer