Stack-based buffer overflow in the HMIWeb Browser HSCDSPRenderDLL ActiveX control in Honeywell Process Solutions (HPS) Experion R2xx, R30x, R31x, and R400.x; Honeywell Building Solutions (HBS) Enterprise Building Manager R400 and R410.1; and Honeywell Environmental Combustion and Controls (ECC) SymmetrE R410.1 allows remote attackers to execute arbitrary code via unspecified vectors.
References
Link | Resource |
---|---|
http://www.us-cert.gov/control_systems/pdf/ICSA-12-150-01.pdf | Third Party Advisory US Government Resource |
https://www.honeywellprocess.com/en-US/support/pages/all-notifications.aspx | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
03 Feb 2022, 19:44
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
CPE | cpe:2.3:a:honeywellprocess:experion:r300:*:*:*:*:*:*:* cpe:2.3:a:honeywellprocess:experion:r200:*:*:*:*:*:*:* cpe:2.3:a:honeywellprocess:enterprise_building_manager:r400:*:*:*:*:*:*:* cpe:2.3:a:honeywellprocess:enterprise_building_manager:r410.1:*:*:*:*:*:*:* cpe:2.3:a:honeywellprocess:experion:r310:*:*:*:*:*:*:* cpe:2.3:a:honeywellprocess:experion:r400.0:*:*:*:*:*:*:* |
cpe:2.3:a:honeywell:enterprise_building_manager:r400:*:*:*:*:*:*:* cpe:2.3:a:honeywell:experion:r310:*:*:*:*:*:*:* cpe:2.3:a:honeywell:experion:r200:*:*:*:*:*:*:* cpe:2.3:a:honeywell:experion:r400.0:*:*:*:*:*:*:* cpe:2.3:a:honeywell:enterprise_building_manager:r410.1:*:*:*:*:*:*:* cpe:2.3:a:honeywell:symmetre:r410.1:*:*:*:*:*:*:* cpe:2.3:a:honeywell:experion:r300:*:*:*:*:*:*:* |
References | (MISC) https://www.honeywellprocess.com/en-US/support/pages/all-notifications.aspx - Vendor Advisory | |
References | (MISC) http://www.us-cert.gov/control_systems/pdf/ICSA-12-150-01.pdf - Third Party Advisory, US Government Resource |
Information
Published : 2012-09-08 10:28
Updated : 2024-02-04 18:16
NVD link : CVE-2012-0254
Mitre link : CVE-2012-0254
CVE.ORG link : CVE-2012-0254
JSON object : View
Products Affected
honeywell
- symmetre
- enterprise_building_manager
- experion
CWE
CWE-787
Out-of-bounds Write