var-201304-0153
Vulnerability from variot
Cogent Real-Time Systems Cogent DataHub before 7.3.0, OPC DataHub before 6.4.22, Cascade DataHub before 6.4.22 on Windows, and DataHub QuickTrend before 7.3.0 allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via malformed data in a formatted text command. Cogent Real-Time Systems is a real-time data solutions vendor. An attacker can exploit this issue to cause an affected application to crash, denying service to legitimate users. The following Cogent Real-Time Systems products are vulnerable: Cogent DataHub 7.2.2 and prior versions OPC DataHub 6.4.21 and prior versions Cascade DataHub for Windows 6.4.21 and prior versions Cogent DataHub DataSim and DataPid demonstration clients 7.2.2 OPC DataHub DataSim and DataPid demonstration clients 6.4.21 Cascade DataHub DataSim and DataPid demonstration clients 6.4.21 DataHub QuickTrend 7.2.2 and prior versions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201304-0153", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cascade datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "6.4.20" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.1.63" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.2" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.0" }, { "model": "opc datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "6.4.20" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.0.2" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.0, "vendor": "cogentdatahub", "version": "7.1.1" }, { "model": "datahub quicktrend", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "7.2.2" }, { "model": "opc datahub", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "6.4.21" }, { "model": "cogent datahub", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "7.2.2" }, { "model": "cascade datahub", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "6.4.21" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.0, "vendor": "cogentdatahub", "version": "7.0" }, { "model": "cascade datahub", "scope": "lt", "trust": 0.8, "vendor": "cogent real time", "version": "6.4.22" }, { "model": "datahub", "scope": "lt", "trust": 0.8, "vendor": "cogent real time", "version": "7.3.0" }, { "model": "datahub quicktrend", "scope": "lt", "trust": 0.8, "vendor": "cogent real time", "version": "7.3.0" }, { "model": "opc datahub", "scope": "lt", "trust": 0.8, "vendor": "cogent real time", "version": "6.4.22" }, { "model": "real-time systems opc datahub", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "6.4.21" }, { "model": "real-time systems cascade datahub", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "6.4.21" }, { "model": "real-time systems cogent datahub", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "7.2.2" }, { "model": "real-time systems datahub quicktrend", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "7.2.2" }, { "model": "real-time systems datapid", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "7.2.2" }, { "model": "real-time systems datapid", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "6.4.21" }, { "model": "real-time systems datasim", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "7.2.2" }, { "model": "real-time systems datasim", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "6.4.21" }, { "model": "datahub quicktrend", "scope": "eq", "trust": 0.6, "vendor": "cogentdatahub", "version": "7.2.2" }, { "model": "cogent datahub", "scope": "eq", "trust": 0.6, "vendor": "cogentdatahub", "version": "7.2.2" }, { "model": "cascade datahub", "scope": "eq", "trust": 0.6, "vendor": "cogentdatahub", "version": "6.4.21" }, { "model": "opc datahub", "scope": "eq", "trust": 0.6, "vendor": "cogentdatahub", "version": "6.4.21" }, { "model": "real-time systems opc datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6.4.20" }, { "model": "real-time systems opc datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6.0.2" }, { "model": "real-time systems opc datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6" }, { "model": "real-time systems cogent datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "7.1.2" }, { "model": "real-time systems cogent datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "7.1.1.63" }, { "model": "real-time systems cogent datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "7" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.0.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.1.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.1.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.1.1.63" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.1.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "opc datahub", "version": "6.4.20" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "opc datahub", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cascade datahub", "version": "6.4.20" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cascade datahub", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "datahub quicktrend", "version": "*" } ], "sources": [ { "db": "IVD", "id": "03949d62-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-02824" }, { "db": "BID", "id": "58910" }, { "db": "JVNDB", "id": "JVNDB-2013-002155" }, { "db": "CNNVD", "id": "CNNVD-201304-031" }, { "db": "NVD", "id": "CVE-2013-0681" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cogentdatahub:cascade_datahub", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cogentdatahub:cogent_datahub", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cogentdatahub:datahub_quicktrend", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cogentdatahub:opc_datahub", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002155" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dillon Beresford", "sources": [ { "db": "BID", "id": "58910" } ], "trust": 0.3 }, "cve": "CVE-2013-0681", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2013-0681", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2013-02824", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "03949d62-2353-11e6-abef-000c29c66e3d", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-0681", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2013-0681", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2013-02824", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201304-031", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "03949d62-2353-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "03949d62-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-02824" }, { "db": "JVNDB", "id": "JVNDB-2013-002155" }, { "db": "CNNVD", "id": "CNNVD-201304-031" }, { "db": "NVD", "id": "CVE-2013-0681" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cogent Real-Time Systems Cogent DataHub before 7.3.0, OPC DataHub before 6.4.22, Cascade DataHub before 6.4.22 on Windows, and DataHub QuickTrend before 7.3.0 allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via malformed data in a formatted text command. Cogent Real-Time Systems is a real-time data solutions vendor. \nAn attacker can exploit this issue to cause an affected application to crash, denying service to legitimate users. \nThe following Cogent Real-Time Systems products are vulnerable:\nCogent DataHub 7.2.2 and prior versions\nOPC DataHub 6.4.21 and prior versions\nCascade DataHub for Windows 6.4.21 and prior versions\nCogent DataHub DataSim and DataPid demonstration clients 7.2.2\nOPC DataHub DataSim and DataPid demonstration clients 6.4.21\nCascade DataHub DataSim and DataPid demonstration clients 6.4.21\nDataHub QuickTrend 7.2.2 and prior versions", "sources": [ { "db": "NVD", "id": "CVE-2013-0681" }, { "db": "JVNDB", "id": "JVNDB-2013-002155" }, { "db": "CNVD", "id": "CNVD-2013-02824" }, { "db": "BID", "id": "58910" }, { "db": "IVD", "id": "03949d62-2353-11e6-abef-000c29c66e3d" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-0681", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-13-095-01", "trust": 3.3 }, { "db": "BID", "id": "58910", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2013-02824", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201304-031", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-002155", "trust": 0.8 }, { "db": "IVD", "id": "03949D62-2353-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "03949d62-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-02824" }, { "db": "BID", "id": "58910" }, { "db": "JVNDB", "id": "JVNDB-2013-002155" }, { "db": "CNNVD", "id": "CNNVD-201304-031" }, { "db": "NVD", "id": "CVE-2013-0681" } ] }, "id": "VAR-201304-0153", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "03949d62-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-02824" } ], "trust": 1.6601670400000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "03949d62-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-02824" } ] }, "last_update_date": "2024-11-23T21:55:36.526000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DataHub QuickTrend", "trust": 0.8, "url": "http://www.cogentdatahub.com/Products/DataHub_QuickTrend.html" }, { "title": "Release Notes", "trust": 0.8, "url": "http://www.cogentdatahub.com/ReleaseNotes.html" }, { "title": "Download Software", "trust": 0.8, "url": "http://www.cogentdatahub.com/Contact_Form.html" }, { "title": "Cogent DataHub", "trust": 0.8, "url": "http://www.cogentdatahub.com/Products/Cogent_DataHub.html" }, { "title": "OPC DataHub", "trust": 0.8, "url": "http://www.cogentdatahub.com/Products/OPC_DataHub.html" }, { "title": "Cascade DataHub", "trust": 0.8, "url": "http://www.cogentdatahub.com/Products/Cascade_DataHub.html" }, { "title": "TopPage", "trust": 0.8, "url": "http://www.cogentdatahub.com/jp/" }, { "title": "Patch for Cogent Real-Time Systems DataHub Remote Denial of Service Vulnerability ( CNVD-2013-21838 )", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/33175" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-02824" }, { "db": "JVNDB", "id": "JVNDB-2013-002155" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002155" }, { "db": "NVD", "id": "CVE-2013-0681" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "http://ics-cert.us-cert.gov/pdf/icsa-13-095-01.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0681" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0681" }, { "trust": 0.3, "url": "http://www.cogentdatahub.com/products/cogent_datahub.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-02824" }, { "db": "BID", "id": "58910" }, { "db": "JVNDB", "id": "JVNDB-2013-002155" }, { "db": "CNNVD", "id": "CNNVD-201304-031" }, { "db": "NVD", "id": "CVE-2013-0681" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "03949d62-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-02824" }, { "db": "BID", "id": "58910" }, { "db": "JVNDB", "id": "JVNDB-2013-002155" }, { "db": "CNNVD", "id": "CNNVD-201304-031" }, { "db": "NVD", "id": "CVE-2013-0681" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-04-09T00:00:00", "db": "IVD", "id": "03949d62-2353-11e6-abef-000c29c66e3d" }, { "date": "2013-04-09T00:00:00", "db": "CNVD", "id": "CNVD-2013-02824" }, { "date": "2013-04-05T00:00:00", "db": "BID", "id": "58910" }, { "date": "2013-04-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002155" }, { "date": "2013-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-031" }, { "date": "2013-04-05T21:55:00.847000", "db": "NVD", "id": "CVE-2013-0681" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-05-26T00:00:00", "db": "CNVD", "id": "CNVD-2013-02824" }, { "date": "2015-03-19T08:43:00", "db": "BID", "id": "58910" }, { "date": "2013-04-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002155" }, { "date": "2013-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-031" }, { "date": "2024-11-21T01:48:00.017000", "db": "NVD", "id": "CVE-2013-0681" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201304-031" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cogent DataHub Service disruption in products (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002155" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation", "sources": [ { "db": "IVD", "id": "03949d62-2353-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201304-031" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.