CVE-2012-4705 – CADA 3S CoDeSys Gateway Server - Directory Traversal
https://notcve.org/view.php?id=CVE-2012-4705
Directory traversal vulnerability in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via vectors involving a crafted pathname. Vulnerabilidad de salto de directorio en CoDeSys Gateway-3S Server antes v2.3.9.27 permite a atacantes remotos ejecutar código arbitrario a través de vectores relacionados con una ruta diseñada. • https://www.exploit-db.com/exploits/41712 http://ics-cert.us-cert.gov/advisories/ICSA-13-050-01A http://ics-cert.us-cert.gov/pdf/ICSA-13-050-01-a.pdf • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2012-4706
https://notcve.org/view.php?id=CVE-2012-4706
Integer signedness error in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to cause a denial of service via a crafted packet that triggers a heap-based buffer overflow. Error de asignación de entero en 3S CODESYS Gateway-Server anterior a v2.3.9.27, permite a atacantes remotos provocar una denegación de servicio a través de un paquete especialmente manipulado que provoca un desbordamiento de búfer (heap) • http://ics-cert.us-cert.gov/advisories/ICSA-13-050-01A • CWE-189: Numeric Errors •
CVE-2012-6068
https://notcve.org/view.php?id=CVE-2012-6068
The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to (1) execute commands via the command-line interface in the TCP listener service or (2) transfer files via requests to the TCP listener service. El Runtime Toolkit de CODESYS Runtime System v2.3.x y v2.4.x no requiere autenticación, lo que permite a atacantes remotos (1) ejecutar comandos a través de la interfaz de línea de comandos del servicio de escucha de TCP o (2) transferir archivos a través de una petición al servicio de escucha TCP • http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01 http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html http://www.digitalbond.com/tools/basecamp/3s-codesys http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2012-6069
https://notcve.org/view.php?id=CVE-2012-6069
Directory traversal vulnerability in the Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x allows remote attackers to read, overwrite, or create arbitrary files via a .. (dot dot) in a request to the TCP listener service. Vulnerabilidad de salto de directorio en el Runtime Toolkit de CODESYS Runtime System v2.3.x y v2.4.x que permite a atacantes remotos leer, sobreescribir, o crear ficheros a través de .. (punto punto) en una solicitud al servicio de escucha TCP. • http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01 http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html http://www.digitalbond.com/tools/basecamp/3s-codesys http://www.securityfocus.com/bid/56300 http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •