Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2012-0245
Modified
More InfoOfficial Page
Source-cret@cert.org
View Known Exploited Vulnerability (KEV) details
Published At-09 Mar, 2012 | 11:55
Updated At-29 Apr, 2026 | 01:13

Multiple stack-based buffer overflows in RobNetScanHost.exe in ABB Robot Communications Runtime before 5.14.02, as used in ABB Interlink Module, IRC5 OPC Server, PC SDK, PickMaster 3 and 5, RobView 5, RobotStudio, WebWare SDK, and WebWare Server, allow remote attackers to execute arbitrary code via a crafted (1) 0xA or (2) 0xE Netscan packet.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

ABB
abb
>>interlink_module>>-
cpe:2.3:a:abb:interlink_module:-:*:*:*:*:*:*:*
ABB
abb
>>irc5_opc_server>>-
cpe:2.3:a:abb:irc5_opc_server:-:*:*:*:*:*:*:*
ABB
abb
>>pc_sdk>>-
cpe:2.3:a:abb:pc_sdk:-:*:*:*:*:*:*:*
ABB
abb
>>pickmaster_3>>-
cpe:2.3:a:abb:pickmaster_3:-:*:*:*:*:*:*:*
ABB
abb
>>pickmaster_5>>-
cpe:2.3:a:abb:pickmaster_5:-:*:*:*:*:*:*:*
ABB
abb
>>robot_communications_runtime>>Versions up to 5.14.01(inclusive)
cpe:2.3:a:abb:robot_communications_runtime:*:*:*:*:*:*:*:*
ABB
abb
>>robotstudio>>-
cpe:2.3:a:abb:robotstudio:-:*:*:*:*:*:*:*
ABB
abb
>>robview_5>>-
cpe:2.3:a:abb:robview_5:-:*:*:*:*:*:*:*
ABB
abb
>>webware_sdk>>-
cpe:2.3:a:abb:webware_sdk:-:*:*:*:*:*:*:*
ABB
abb
>>webware_server>>-
cpe:2.3:a:abb:webware_server:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
CWE ID: CWE-119
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://archives.neohapsis.com/archives/bugtraq/2012-02/0125.htmlcret@cert.org
N/A
http://secunia.com/advisories/48090cret@cert.org
Vendor Advisory
http://www.securityfocus.com/bid/52123cret@cert.org
N/A
http://www.us-cert.gov/control_systems/pdf/ICSA-12-059-01.pdfcret@cert.org
Patch
US Government Resource
http://www.zerodayinitiative.com/advisories/ZDI-12-033/cret@cert.org
N/A
http://www05.abb.com/global/scot/scot348.nsf/veritydisplay/f261be074480dc24c12579a00049ecd5/%24file/si10227a1%20vulnerability%20security%20advisory.pdfcret@cert.org
N/A
http://archives.neohapsis.com/archives/bugtraq/2012-02/0125.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/48090af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/52123af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.us-cert.gov/control_systems/pdf/ICSA-12-059-01.pdfaf854a3a-2127-422b-91ae-364da2661108
Patch
US Government Resource
http://www.zerodayinitiative.com/advisories/ZDI-12-033/af854a3a-2127-422b-91ae-364da2661108
N/A
http://www05.abb.com/global/scot/scot348.nsf/veritydisplay/f261be074480dc24c12579a00049ecd5/%24file/si10227a1%20vulnerability%20security%20advisory.pdfaf854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://archives.neohapsis.com/archives/bugtraq/2012-02/0125.html
Source: cret@cert.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/48090
Source: cret@cert.org
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/52123
Source: cret@cert.org
Resource: N/A
Hyperlink: http://www.us-cert.gov/control_systems/pdf/ICSA-12-059-01.pdf
Source: cret@cert.org
Resource:
Patch
US Government Resource
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-12-033/
Source: cret@cert.org
Resource: N/A
Hyperlink: http://www05.abb.com/global/scot/scot348.nsf/veritydisplay/f261be074480dc24c12579a00049ecd5/%24file/si10227a1%20vulnerability%20security%20advisory.pdf
Source: cret@cert.org
Resource: N/A
Hyperlink: http://archives.neohapsis.com/archives/bugtraq/2012-02/0125.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/48090
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/52123
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.us-cert.gov/control_systems/pdf/ICSA-12-059-01.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
US Government Resource
Hyperlink: http://www.zerodayinitiative.com/advisories/ZDI-12-033/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www05.abb.com/global/scot/scot348.nsf/veritydisplay/f261be074480dc24c12579a00049ecd5/%24file/si10227a1%20vulnerability%20security%20advisory.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Change History
0Changes found

Details not found