CVE-2017-9637
https://notcve.org/view.php?id=CVE-2017-9637
Schneider Electric Ampla MES 6.4 provides capability to interact with data from third party databases. When connectivity to those databases is configured to use a SQL user name and password, an attacker may be able to sniff details from the connection string. Schneider Electric recommends that users of Ampla MES versions 6.4 and prior should upgrade to Ampla MES version 6.5 as soon as possible. Schneider Electric Ampla MES 6.4 proporciona capacidades para interactuar con datos de bases de datos de terceros. Cuando la conectividad a esas bases de datos se configura para emplear un nombre de usuario y contraseña SQL, un atacante podría ser capaz de rastrear detalles de la cadena de conexión. • http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000118 http://www.securityfocus.com/bid/99469 https://ics-cert.us-cert.gov/advisories/ICSA-17-187-05 • CWE-319: Cleartext Transmission of Sensitive Information CWE-522: Insufficiently Protected Credentials •
CVE-2017-6021
https://notcve.org/view.php?id=CVE-2017-6021
In Schneider Electric ClearSCADA 2014 R1 (build 75.5210) and prior, 2014 R1.1 (build 75.5387) and prior, 2015 R1 (build 76.5648) and prior, and 2015 R2 (build 77.5882) and prior, an attacker with network access to the ClearSCADA server can send specially crafted sequences of commands and data packets to the ClearSCADA server that can cause the ClearSCADA server process and ClearSCADA communications driver processes to terminate. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). En Schneider Electric ClearSCADA 2014 R1 (build 75.5210) y anteriores, 2014 R1.1 (build 75.5387) y anteriores, 2015 R1 (build 76.5648) y anteriores y 2015 R2 (build 77.5882) y anteriores, un atacante con acceso de red al servidor ClearSCADA puede enviar secuencias de comandos especialmente manipuladas y paquetes de datos al servidor ClearSCADA que pueden provocar que el proceso del servidor ClearSCADA y los procesos del controlador de comunicaciones ClearSCADA finalicen. Se ha calculado una puntuación base de CVSS v3 de 7.5; la cadena de vector CVSS es (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). • http://www.securityfocus.com/bid/96768 https://ics-cert.us-cert.gov/advisories/ICSA-17-068-01 • CWE-20: Improper Input Validation •
CVE-2018-7522
https://notcve.org/view.php?id=CVE-2018-7522
In Schneider Electric Triconex Tricon MP model 3008 firmware versions 10.0-10.4, when a system call is made, registers are stored to a fixed memory location. Modifying the data in this location could allow attackers to gain supervisor-level access and control system states. En Schneider Electric Triconex Tricon MP modelo 3008, con versiones de firmware 10.0-10.4, cuando se realiza una llamada del sistema, los registros se almacenan en una ubicación fija de la memoria. La modificación de los datos en esta ubicación podría permitir que atacantes obtengan acceso de nivel supervisor y controlen los estados del sistema. • http://www.securityfocus.com/bid/103947 https://ics-cert.us-cert.gov/advisories/ICSA-18-107-02 https://www.schneider-electric.com/en/download/document/SEVD-2017-347-01 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2018-8872
https://notcve.org/view.php?id=CVE-2018-8872
In Schneider Electric Triconex Tricon MP model 3008 firmware versions 10.0-10.4, system calls read directly from memory addresses within the control program area without any verification. Manipulating this data could allow attacker data to be copied anywhere within memory. En Schneider Electric Triconex Tricon MP modelo 3008 con versiones de firmware 10.0-10.4, las llamadas del sistema leen directamente de las direcciones de memoria en el área del programa de control sin ningún tipo de verificación. La manipulación de estos datos podría permitir que los datos del atacante se copien en cualquier sitio de la memoria. • http://www.securityfocus.com/bid/103947 https://ics-cert.us-cert.gov/advisories/ICSA-18-107-02 https://www.schneider-electric.com/en/download/document/SEVD-2017-347-01 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2018-2796 – OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981)
https://notcve.org/view.php?id=CVE-2018-2796
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. • http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securityfocus.com/bid/103868 http://www.securitytracker.com/id/1040697 https://access.redhat.com/errata/RHSA-2018:1188 https://access.redhat.com/errata/RHSA-2018:1191 https://access.redhat.com/errata/RHSA-2018:1201 https://access.redhat.com/errata/RHSA-2018:1202 https://access.redhat.com/errata/RHSA-2018:1204 https://access.redhat.com/errata/RHSA-2018:1206 https://access.redhat.com/errata/ • CWE-770: Allocation of Resources Without Limits or Throttling •