ID

VAR-201201-0153


CVE

CVE-2012-0918


TITLE

Arbitrary Code Execution Vulnerability in Hitachi COBOL2002

Trust: 0.8

sources: JVNDB: JVNDB-2012-001191

DESCRIPTION

Unspecified vulnerability in Hitachi COBOL2002 Net Developer, Net Server Suite, and Net Client Suite 01-00, 01-01 through 01-01-/D, 01-02 through 01-02-/F, 01-03 through 01-03-/F, 02-00 through 02-00-/D, 02-01 through 02-01-/C, and possibly other versions before 02-01-/D allows remote attackers to execute arbitrary code via unknown attack vectors. Multiple Hitachi COBOL2002 products have security vulnerabilities that allow attackers to take control of target user systems. No detailed vulnerability details are provided at this time. Hitachi COBOL2002 is prone to an unspecified remote code-execution vulnerability. Successful exploits will compromise the application and possibly the underlying system. ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Hitachi COBOL2002 Products Unspecified Vulnerability SECUNIA ADVISORY ID: SA47612 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47612/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47612 RELEASE DATE: 2012-01-20 DISCUSS ADVISORY: http://secunia.com/advisories/47612/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47612/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47612 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Hitachi has reported a vulnerability in some COBOL2002 products, which can be exploited by malicious users to compromise a vulnerable system. No further information is currently available. The vulnerability is reported in versions 02-00 through 02-00-/D and 02-01 through 02-01-/C. SOLUTION: Update to version 02-01-/D. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-002/index.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2012-0918 // JVNDB: JVNDB-2012-001191 // CNVD: CNVD-2012-0341 // BID: 51580 // PACKETSTORM: 108860 // PACKETSTORM: 108859

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-0341

AFFECTED PRODUCTS

vendor:hitachimodel:cobol2002 net client suitescope:eqversion:01-03-\/f

Trust: 1.6

vendor:hitachimodel:cobol2002 net client suitescope:eqversion:02-00

Trust: 1.6

vendor:hitachimodel:cobol2002 net client suitescope:eqversion:01-02

Trust: 1.6

vendor:hitachimodel:cobol2002 net client suitescope:eqversion:01-01

Trust: 1.6

vendor:hitachimodel:cobol2002 net client suitescope:eqversion:01-00

Trust: 1.6

vendor:hitachimodel:cobol2002 net client suitescope:eqversion:01-02-\/f

Trust: 1.6

vendor:hitachimodel:cobol2002 net client suitescope:eqversion:02-00-\/d

Trust: 1.6

vendor:hitachimodel:cobol2002 net client suitescope:eqversion:01-01-\/d

Trust: 1.6

vendor:hitachimodel:cobol2002 net client suitescope:eqversion:01-03

Trust: 1.6

vendor:hitachimodel:cobol2002 net client suitescope:eqversion:02-01

Trust: 1.6

vendor:hitachimodel:cobol2002 net developerscope:eqversion:01-03

Trust: 1.0

vendor:hitachimodel:cobol2002 net server suitescope:eqversion:02-00-\/d

Trust: 1.0

vendor:hitachimodel:cobol2002 net server suitescope:eqversion:01-03-\/f

Trust: 1.0

vendor:hitachimodel:cobol2002 net server suitescope:eqversion:01-01-\/d

Trust: 1.0

vendor:hitachimodel:cobol2002 net server suitescope:eqversion:01-01

Trust: 1.0

vendor:hitachimodel:cobol2002 net server suitescope:eqversion:01-00

Trust: 1.0

vendor:hitachimodel:cobol2002 net server suitescope:eqversion:01-03

Trust: 1.0

vendor:hitachimodel:cobol2002 net developerscope:eqversion:02-01

Trust: 1.0

vendor:hitachimodel:cobol2002 net developerscope:eqversion:01-02

Trust: 1.0

vendor:hitachimodel:cobol2002 net developerscope:eqversion:02-00

Trust: 1.0

vendor:hitachimodel:cobol2002 net developerscope:eqversion:01-02-\/f

Trust: 1.0

vendor:hitachimodel:cobol2002 net server suitescope:eqversion:02-01

Trust: 1.0

vendor:hitachimodel:cobol2002 net server suitescope:eqversion:01-02

Trust: 1.0

vendor:hitachimodel:cobol2002 net server suitescope:eqversion:02-00

Trust: 1.0

vendor:hitachimodel:cobol2002 net server suitescope:eqversion:01-02-\/f

Trust: 1.0

vendor:hitachimodel:cobol2002 net developerscope:eqversion:02-01-\/c

Trust: 1.0

vendor:hitachimodel:cobol2002 net developerscope:eqversion:02-00-\/d

Trust: 1.0

vendor:hitachimodel:cobol2002 net developerscope:eqversion:01-03-\/f

Trust: 1.0

vendor:hitachimodel:cobol2002 net developerscope:eqversion:01-01-\/d

Trust: 1.0

vendor:hitachimodel:cobol2002 net developerscope:eqversion:01-01

Trust: 1.0

vendor:hitachimodel:cobol2002 net developerscope:eqversion:01-00

Trust: 1.0

vendor:hitachimodel:cobol2002 net client suitescope: - version: -

Trust: 0.8

vendor:hitachimodel:cobol2002 net developerscope: - version: -

Trust: 0.8

vendor:hitachimodel:cobol2002 net server suitescope: - version: -

Trust: 0.8

vendor:hitachimodel:cobol2002 net server suitescope:eqversion:2.x

Trust: 0.6

vendor:hitachimodel:cobol2002 net client suitescope:eqversion:2.x

Trust: 0.6

vendor:hitachimodel:cobol2002 net developerscope:eqversion:2.x

Trust: 0.6

vendor:hitachimodel:cobol2002 net server suitescope:eqversion:0

Trust: 0.3

vendor:hitachimodel:cobol2002 net developerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:cobol2002 net client suitescope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2012-0341 // BID: 51580 // JVNDB: JVNDB-2012-001191 // CNNVD: CNNVD-201201-326 // NVD: CVE-2012-0918

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0918
value: HIGH

Trust: 1.0

NVD: CVE-2012-0918
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201201-326
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2012-0918
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2012-001191 // CNNVD: CNNVD-201201-326 // NVD: CVE-2012-0918

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2012-0918

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201201-326

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201201-326

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001191

PATCH

title:HS12-002url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-002/index.html

Trust: 0.8

title:Patch for Hitachi COBOL2002 product has an unknown vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/8212

Trust: 0.6

sources: CNVD: CNVD-2012-0341 // JVNDB: JVNDB-2012-001191

EXTERNAL IDS

db:NVDid:CVE-2012-0918

Trust: 2.7

db:SECUNIAid:47612

Trust: 2.4

db:HITACHIid:HS12-002

Trust: 2.1

db:BIDid:51580

Trust: 1.9

db:SECUNIAid:47643

Trust: 1.8

db:JVNDBid:JVNDB-2012-001191

Trust: 0.8

db:CNVDid:CNVD-2012-0341

Trust: 0.6

db:XFid:72558

Trust: 0.6

db:XFid:2002

Trust: 0.6

db:CNNVDid:CNNVD-201201-326

Trust: 0.6

db:PACKETSTORMid:108860

Trust: 0.1

db:PACKETSTORMid:108859

Trust: 0.1

sources: CNVD: CNVD-2012-0341 // BID: 51580 // JVNDB: JVNDB-2012-001191 // PACKETSTORM: 108860 // PACKETSTORM: 108859 // CNNVD: CNNVD-201201-326 // NVD: CVE-2012-0918

REFERENCES

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs12-002/index.html

Trust: 2.1

url:http://www.securityfocus.com/bid/51580

Trust: 1.6

url:http://secunia.com/advisories/47643

Trust: 1.6

url:http://secunia.com/advisories/47612

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/72558

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0918

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0918

Trust: 0.8

url:http://secunia.com/advisories/47612/

Trust: 0.7

url:http://xforce.iss.net/xforce/xfdb/72558

Trust: 0.6

url:http://secunia.com/company/jobs/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47643

Trust: 0.1

url:http://secunia.com/advisories/47643/#comments

Trust: 0.1

url:http://secunia.com/advisories/47643/

Trust: 0.1

url:http://secunia.com/advisories/47612/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47612

Trust: 0.1

sources: CNVD: CNVD-2012-0341 // BID: 51580 // JVNDB: JVNDB-2012-001191 // PACKETSTORM: 108860 // PACKETSTORM: 108859 // CNNVD: CNNVD-201201-326 // NVD: CVE-2012-0918

CREDITS

Hitachi

Trust: 0.9

sources: BID: 51580 // CNNVD: CNNVD-201201-326

SOURCES

db:CNVDid:CNVD-2012-0341
db:BIDid:51580
db:JVNDBid:JVNDB-2012-001191
db:PACKETSTORMid:108860
db:PACKETSTORMid:108859
db:CNNVDid:CNNVD-201201-326
db:NVDid:CVE-2012-0918

LAST UPDATE DATE

2024-08-14T12:38:07.714000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-0341date:2012-02-01T00:00:00
db:BIDid:51580date:2015-03-19T07:35:00
db:JVNDBid:JVNDB-2012-001191date:2012-01-27T00:00:00
db:CNNVDid:CNNVD-201201-326date:2012-01-31T00:00:00
db:NVDid:CVE-2012-0918date:2017-08-29T01:31:06.320

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-0341date:2012-02-01T00:00:00
db:BIDid:51580date:2012-01-20T00:00:00
db:JVNDBid:JVNDB-2012-001191date:2012-01-27T00:00:00
db:PACKETSTORMid:108860date:2012-01-20T08:20:03
db:PACKETSTORMid:108859date:2012-01-20T08:20:00
db:CNNVDid:CNNVD-201201-326date:1900-01-01T00:00:00
db:NVDid:CVE-2012-0918date:2012-01-24T18:55:01.863