CVE编号
CVE-2010-2965利用情况
暂无补丁情况
N/A披露时间
2010-08-06漏洞描述
The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used on the Rockwell Automation 1756-ENBT series A with firmware 3.2.6 and 3.6.1 and other products, allows remote attackers to read or modify arbitrary memory locations, perform function calls, or manage tasks via requests to UDP port 17185, a related issue to CVE-2005-3804.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html | |
http://rockwellautomation.custhelp.com/cgi-bin/rockwellautomation.cfg/php/end... | |
http://www.kb.cert.org/vuls/id/362332 | |
http://www.kb.cert.org/vuls/id/MAPG-86EPFA | |
http://www.kb.cert.org/vuls/id/MAPG-86FPQL | |
https://support.windriver.com/olsPortal/faces/maintenance/downloadDetails.jsp... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | rockwellautomation | 1756-enbt_series_a_firmware | 3.2.6 | - | |||||
运行在以下环境 | |||||||||
系统 | rockwellautomation | 1756-enbt_series_a_firmware | 3.6.1 | - | |||||
运行在以下环境 | |||||||||
系统 | windriver | vxworks | * |
Up to (including) 6.8 |
|||||
运行在以下环境 | |||||||||
系统 | windriver | vxworks | 5 | - | |||||
运行在以下环境 | |||||||||
系统 | windriver | vxworks | 5.5 | - | |||||
运行在以下环境 | |||||||||
系统 | windriver | vxworks | 6 | - | |||||
运行在以下环境 | |||||||||
系统 | windriver | vxworks | 6.4 | - | |||||
运行在以下环境 | |||||||||
硬件 | rockwellautomation | 1756-enbt_series_a | * | - | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 N/A
- 用户交互 无
- 可用性 完全地
- 保密性 完全地
- 完整性 完全地
还没有评论,来说两句吧...