CVE-2012-4355
19.08.2012, 20:55
TCPIPS_Story.dll in Sielco Sistemi Winlog Pro SCADA before 2.07.18 and Winlog Lite SCADA before 2.07.18 allows remote attackers to execute arbitrary code via a port-46824 TCP packet with a crafted negative integer after the opcode, triggering incorrect function-pointer processing that can lead to a buffer overflow. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-4354.Enginsight
Vendor | Product | Version |
---|---|---|
sielcosistemi | winlog_pro | 𝑥 ≤ 2.07.17 |
sielcosistemi | winlog_pro | 2.06.00 |
sielcosistemi | winlog_pro | 2.06.03 |
sielcosistemi | winlog_pro | 2.06.04 |
sielcosistemi | winlog_pro | 2.06.06 |
sielcosistemi | winlog_pro | 2.06.09 |
sielcosistemi | winlog_pro | 2.06.10 |
sielcosistemi | winlog_pro | 2.06.12 |
sielcosistemi | winlog_pro | 2.06.13 |
sielcosistemi | winlog_pro | 2.06.14 |
sielcosistemi | winlog_pro | 2.06.18 |
sielcosistemi | winlog_pro | 2.06.21 |
sielcosistemi | winlog_pro | 2.06.24 |
sielcosistemi | winlog_pro | 2.06.25 |
sielcosistemi | winlog_pro | 2.06.28 |
sielcosistemi | winlog_pro | 2.06.40 |
sielcosistemi | winlog_pro | 2.06.46 |
sielcosistemi | winlog_pro | 2.06.50 |
sielcosistemi | winlog_pro | 2.06.60 |
sielcosistemi | winlog_pro | 2.06.73 |
sielcosistemi | winlog_pro | 2.06.86 |
sielcosistemi | winlog_pro | 2.07.00 |
sielcosistemi | winlog_pro | 2.07.01 |
sielcosistemi | winlog_pro | 2.07.08 |
sielcosistemi | winlog_pro | 2.07.09 |
sielcosistemi | winlog_pro | 2.07.11 |
sielcosistemi | winlog_pro | 2.07.14 |
sielcosistemi | winlog_pro | 2.07.16 |
sielcosistemi | winlog_lite | 𝑥 ≤ 2.07.17 |
sielcosistemi | winlog_lite | 2.06.00 |
sielcosistemi | winlog_lite | 2.06.03 |
sielcosistemi | winlog_lite | 2.06.04 |
sielcosistemi | winlog_lite | 2.06.06 |
sielcosistemi | winlog_lite | 2.06.09 |
sielcosistemi | winlog_lite | 2.06.10 |
sielcosistemi | winlog_lite | 2.06.12 |
sielcosistemi | winlog_lite | 2.06.13 |
sielcosistemi | winlog_lite | 2.06.14 |
sielcosistemi | winlog_lite | 2.06.18 |
sielcosistemi | winlog_lite | 2.06.21 |
sielcosistemi | winlog_lite | 2.06.24 |
sielcosistemi | winlog_lite | 2.06.25 |
sielcosistemi | winlog_lite | 2.06.28 |
sielcosistemi | winlog_lite | 2.06.40 |
sielcosistemi | winlog_lite | 2.06.46 |
sielcosistemi | winlog_lite | 2.06.50 |
sielcosistemi | winlog_lite | 2.06.60 |
sielcosistemi | winlog_lite | 2.06.73 |
sielcosistemi | winlog_lite | 2.06.86 |
sielcosistemi | winlog_lite | 2.07.00 |
sielcosistemi | winlog_lite | 2.07.01 |
sielcosistemi | winlog_lite | 2.07.08 |
sielcosistemi | winlog_lite | 2.07.09 |
sielcosistemi | winlog_lite | 2.07.11 |
sielcosistemi | winlog_lite | 2.07.14 |
sielcosistemi | winlog_lite | 2.07.16 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References