var-201304-0152
Vulnerability from variot
Stack-based buffer overflow in the web server in Cogent Real-Time Systems Cogent DataHub before 7.3.0, OPC DataHub before 6.4.22, Cascade DataHub before 6.4.22 on Windows, and DataHub QuickTrend before 7.3.0 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long HTTP header. Cogent Real-Time Systems is a real-time data solutions vendor. An attacker can exploit this issue to execute arbitrary code within the context of the affected applications. Failed exploit attempts may crash the application, denying service to legitimate users. and prior OPC DataHub versions 6.4.21 and prior Cascade DataHub for Windows version 6.4.21 and prior Cogent DataHub DataSim and DataPid demonstration version 7.2.2 OPC DataHub DataSim and DataPid demonstration clients version 6.4.21 Cascade DataHub DataSim and DataPid demonstration clients version 6.4.21 DataHub QuickTrend version 7.2.2 and prior
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201304-0152", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.0" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.1" }, { "model": "cascade datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "6.4.20" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.1.63" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.0" }, { "model": "opc datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "6.4.20" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.0.2" }, { "model": "datahub quicktrend", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "7.2.2" }, { "model": "opc datahub", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "6.4.21" }, { "model": "cogent datahub", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "7.2.2" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.0, "vendor": "cogentdatahub", "version": "7.1.2" }, { "model": "cascade datahub", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "6.4.21" }, { "model": "cascade datahub", "scope": "lt", "trust": 0.8, "vendor": "cogent real time", "version": "6.4.22" }, { "model": "datahub", "scope": "lt", "trust": 0.8, "vendor": "cogent real time", "version": "7.3.0" }, { "model": "datahub quicktrend", "scope": "lt", "trust": 0.8, "vendor": "cogent real time", "version": "7.3.0" }, { "model": "opc datahub", "scope": "lt", "trust": 0.8, "vendor": "cogent real time", "version": "6.4.22" }, { "model": "real-time systems opc datahub", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "6.4.21" }, { "model": "real-time systems cascade datahub", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "6.4.21" }, { "model": "real-time systems cogent datahub", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "7.2.2" }, { "model": "real-time systems datahub quicktrend", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "7.2.2" }, { "model": "real-time systems datapid", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "7.2.2" }, { "model": "real-time systems datapid", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "6.4.21" }, { "model": "real-time systems datasim", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "7.2.2" }, { "model": "real-time systems datasim", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "6.4.21" }, { "model": "datahub quicktrend", "scope": "eq", "trust": 0.6, "vendor": "cogentdatahub", "version": "7.2.2" }, { "model": "cascade datahub", "scope": "eq", "trust": 0.6, "vendor": "cogentdatahub", "version": "6.4.21" }, { "model": "opc datahub", "scope": "eq", "trust": 0.6, "vendor": "cogentdatahub", "version": "6.4.21" }, { "model": "real-time systems opc datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6.4.20" }, { "model": "real-time systems opc datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6.0.2" }, { "model": "real-time systems cogent datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "7.1.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.0.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.1.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.1.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.1.1.63" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.1.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "opc datahub", "version": "6.4.20" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "opc datahub", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cascade datahub", "version": "6.4.20" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cascade datahub", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "datahub quicktrend", "version": "*" } ], "sources": [ { "db": "IVD", "id": "039a082e-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-02825" }, { "db": "BID", "id": "58902" }, { "db": "JVNDB", "id": "JVNDB-2013-002154" }, { "db": "CNNVD", "id": "CNNVD-201304-030" }, { "db": "NVD", "id": "CVE-2013-0680" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cogentdatahub:cascade_datahub", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cogentdatahub:cogent_datahub", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cogentdatahub:datahub_quicktrend", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cogentdatahub:opc_datahub", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002154" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dillon Beresford", "sources": [ { "db": "BID", "id": "58902" } ], "trust": 0.3 }, "cve": "CVE-2013-0680", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2013-0680", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2013-02825", "impactScore": 7.8, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "039a082e-2353-11e6-abef-000c29c66e3d", "impactScore": 7.8, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-0680", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-0680", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2013-02825", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201304-030", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "039a082e-2353-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "039a082e-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-02825" }, { "db": "JVNDB", "id": "JVNDB-2013-002154" }, { "db": "CNNVD", "id": "CNNVD-201304-030" }, { "db": "NVD", "id": "CVE-2013-0680" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in the web server in Cogent Real-Time Systems Cogent DataHub before 7.3.0, OPC DataHub before 6.4.22, Cascade DataHub before 6.4.22 on Windows, and DataHub QuickTrend before 7.3.0 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long HTTP header. Cogent Real-Time Systems is a real-time data solutions vendor. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected applications. Failed exploit attempts may crash the application, denying service to legitimate users. and prior\nOPC DataHub versions 6.4.21 and prior\nCascade DataHub for Windows version 6.4.21 and prior\nCogent DataHub DataSim and DataPid demonstration version 7.2.2\nOPC DataHub DataSim and DataPid demonstration clients version 6.4.21\nCascade DataHub DataSim and DataPid demonstration clients version 6.4.21\nDataHub QuickTrend version 7.2.2 and prior", "sources": [ { "db": "NVD", "id": "CVE-2013-0680" }, { "db": "JVNDB", "id": "JVNDB-2013-002154" }, { "db": "CNVD", "id": "CNVD-2013-02825" }, { "db": "BID", "id": "58902" }, { "db": "IVD", "id": "039a082e-2353-11e6-abef-000c29c66e3d" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-0680", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-13-095-01", "trust": 3.0 }, { "db": "BID", "id": "58902", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2013-02825", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201304-030", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-002154", "trust": 0.8 }, { "db": "IVD", "id": "039A082E-2353-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "039a082e-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-02825" }, { "db": "BID", "id": "58902" }, { "db": "JVNDB", "id": "JVNDB-2013-002154" }, { "db": "CNNVD", "id": "CNNVD-201304-030" }, { "db": "NVD", "id": "CVE-2013-0680" } ] }, "id": "VAR-201304-0152", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "039a082e-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-02825" } ], "trust": 1.6601670400000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "039a082e-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-02825" } ] }, "last_update_date": "2024-11-23T21:55:36.490000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DataHub QuickTrend", "trust": 0.8, "url": "http://www.cogentdatahub.com/Products/DataHub_QuickTrend.html" }, { "title": "Release Notes", "trust": 0.8, "url": "http://www.cogentdatahub.com/ReleaseNotes.html" }, { "title": "Download Software", "trust": 0.8, "url": "http://www.cogentdatahub.com/Contact_Form.html" }, { "title": "Cogent DataHub", "trust": 0.8, "url": "http://www.cogentdatahub.com/Products/Cogent_DataHub.html" }, { "title": "OPC DataHub", "trust": 0.8, "url": "http://www.cogentdatahub.com/Products/OPC_DataHub.html" }, { "title": "Cascade DataHub", "trust": 0.8, "url": "http://www.cogentdatahub.com/Products/Cascade_DataHub.html" }, { "title": "TopPage", "trust": 0.8, "url": "http://www.cogentdatahub.com/jp/" }, { "title": "Patch for Cogent Real-Time Systems DataHub Remote Stack Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/33176" }, { "title": "OPCDataHub-6.4.22-130302-Windows", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45674" }, { "title": "CogentDataHub-7.3.0-130328-Windows", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45673" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-02825" }, { "db": "JVNDB", "id": "JVNDB-2013-002154" }, { "db": "CNNVD", "id": "CNNVD-201304-030" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002154" }, { "db": "NVD", "id": "CVE-2013-0680" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "http://ics-cert.us-cert.gov/pdf/icsa-13-095-01.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0680" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0680" }, { "trust": 0.3, "url": "http://www.cogentdatahub.com/products/cogent_datahub.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-02825" }, { "db": "BID", "id": "58902" }, { "db": "JVNDB", "id": "JVNDB-2013-002154" }, { "db": "CNNVD", "id": "CNNVD-201304-030" }, { "db": "NVD", "id": "CVE-2013-0680" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "039a082e-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-02825" }, { "db": "BID", "id": "58902" }, { "db": "JVNDB", "id": "JVNDB-2013-002154" }, { "db": "CNNVD", "id": "CNNVD-201304-030" }, { "db": "NVD", "id": "CVE-2013-0680" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-04-09T00:00:00", "db": "IVD", "id": "039a082e-2353-11e6-abef-000c29c66e3d" }, { "date": "2013-04-09T00:00:00", "db": "CNVD", "id": "CNVD-2013-02825" }, { "date": "2013-04-05T00:00:00", "db": "BID", "id": "58902" }, { "date": "2013-04-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002154" }, { "date": "2013-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-030" }, { "date": "2013-04-05T21:55:00.827000", "db": "NVD", "id": "CVE-2013-0680" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-05-27T00:00:00", "db": "CNVD", "id": "CNVD-2013-02825" }, { "date": "2013-04-05T17:08:00", "db": "BID", "id": "58902" }, { "date": "2013-04-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002154" }, { "date": "2013-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-030" }, { "date": "2024-11-21T01:47:59.903000", "db": "NVD", "id": "CVE-2013-0680" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201304-030" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cogent Real-Time Systems DataHub Remote Stack Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "039a082e-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-02825" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "039a082e-2353-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201304-030" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.