| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.5 | $0-$5k | 0.00 |
Summary
A vulnerability labeled as critical has been found in Sielcosistemi Winlog PRO up to 2.06.72. This affects an unknown part. Executing a manipulation can lead to memory corruption. This vulnerability is handled as CVE-2011-4037. There is not any exploit available. The affected component should be upgraded.
Details
A vulnerability was found in Sielcosistemi Winlog PRO up to 2.06.72. It has been declared as very critical. This vulnerability affects an unknown part. The manipulation with an unknown input leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
Buffer overflow in Sielco Sistemi Winlog PRO before 2.07.09 and Winlog Lite before 2.07.09 allows user-assisted remote attackers to execute arbitrary code via invalid data in unspecified fields of a project file.
The weakness was released 12/22/2011 by Paul (Website). The advisory is shared for download at us-cert.gov. This vulnerability was named CVE-2011-4037 since 10/13/2011. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 04/08/2017).
Upgrading to version 2.06.73 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (71658), SecurityFocus (BID 50932†), Secunia (SA47078†), SecurityTracker (ID 1026388†) and Vulnerability Center (SBV-34059†). VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Vendor
Name
Version
- 2.06.0
- 2.06.1
- 2.06.2
- 2.06.3
- 2.06.4
- 2.06.5
- 2.06.6
- 2.06.7
- 2.06.8
- 2.06.9
- 2.06.10
- 2.06.11
- 2.06.12
- 2.06.13
- 2.06.14
- 2.06.15
- 2.06.16
- 2.06.17
- 2.06.18
- 2.06.19
- 2.06.20
- 2.06.21
- 2.06.22
- 2.06.23
- 2.06.24
- 2.06.25
- 2.06.26
- 2.06.27
- 2.06.28
- 2.06.29
- 2.06.30
- 2.06.31
- 2.06.32
- 2.06.33
- 2.06.34
- 2.06.35
- 2.06.36
- 2.06.37
- 2.06.38
- 2.06.39
- 2.06.40
- 2.06.41
- 2.06.42
- 2.06.43
- 2.06.44
- 2.06.45
- 2.06.46
- 2.06.47
- 2.06.48
- 2.06.49
- 2.06.50
- 2.06.51
- 2.06.52
- 2.06.53
- 2.06.54
- 2.06.55
- 2.06.56
- 2.06.57
- 2.06.58
- 2.06.59
- 2.06.60
- 2.06.61
- 2.06.62
- 2.06.63
- 2.06.64
- 2.06.65
- 2.06.66
- 2.06.67
- 2.06.68
- 2.06.69
- 2.06.70
- 2.06.71
- 2.06.72
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 10.0VulDB Meta Temp Score: 9.5
VulDB Base Score: 10.0
VulDB Temp Score: 9.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
OpenVAS ID: 802552
OpenVAS Name: Sielco Sistemi Winlog PRO Buffer overflow Vulnerability
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Winlog PRO 2.06.73
Timeline
10/13/2011 🔍12/06/2011 🔍
12/06/2011 🔍
12/07/2011 🔍
12/07/2011 🔍
12/19/2011 🔍
12/22/2011 🔍
12/22/2011 🔍
03/23/2015 🔍
04/08/2017 🔍
Sources
Advisory: us-cert.govResearcher: Paul
Status: Confirmed
CVE: CVE-2011-4037 (🔍)
GCVE (CVE): GCVE-0-2011-4037
GCVE (VulDB): GCVE-100-59776
X-Force: 71658
SecurityFocus: 50932 - Sielco Sistemi Multiple Products Buffer Overflow Vulnerability
Secunia: 47078 - Winlog Pro Project File Processing Buffer Overflow Vulnerability, Highly Critical
SecurityTracker: 1026388 - Winlog Pro Project File Buffer Overflow Lets Remote Users Execute Arbitrary Code
Vulnerability Center: 34059 - Sielco Sistemi Winlog before 2.07.09 Remote DoS or Code Execution via Crafted Project File, Medium
Entry
Created: 03/23/2015 16:50Updated: 04/08/2017 19:48
Changes: 03/23/2015 16:50 (56), 04/08/2017 19:48 (16)
Complete: 🔍
Cache ID: 216::103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.