Pro-face WinGP PC Runtime 3.1.00 and earlier, and ProServr.exe in Pro-face Pro-Server EX 1.30.000 and earlier, allows remote attackers to obtain sensitive information from daemon memory via a crafted packet with a certain opcode.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.org/adv/proservrex_1-adv.txt - Exploit | |
References | () http://ics-cert.us-cert.gov/advisories/ICSA-12-179-01 - | |
References | () http://secunia.com/advisories/49172 - | |
References | () http://www.securityfocus.com/bid/53499 - | |
References | () https://www.hmisource.com/otasuke/download/update/server_ex/server_ex/Readme_E.txt - | |
References | () https://www.hmisource.com/otasuke/news/2012/0606.html - Vendor Advisory |
Information
Published : 2012-06-25 17:55
Updated : 2024-11-21 01:41
NVD link : CVE-2012-3796
Mitre link : CVE-2012-3796
CVE.ORG link : CVE-2012-3796
JSON object : View
Products Affected
pro-face
- pro-server_ex
- wingp_pc_runtime
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor