From 3072c2f08ad8658f278066853604a094f3c6c013 Mon Sep 17 00:00:00 2001 From: Tod Beardsley Date: Mon, 5 May 2014 13:25:55 -0500 Subject: [PATCH] Update CVEs for RootedCon Yokogawa modules Noticed they were nicely documented at http://chemical-facility-security-news.blogspot.com/2014/03/ics-cert-publishes-yokogawa-advisory.html We apparently never updated with CVE numbers. --- modules/auxiliary/dos/scada/yokogawa_logsvr.rb | 3 ++- modules/exploits/windows/scada/yokogawa_bkbcopyd_bof.rb | 3 ++- modules/exploits/windows/scada/yokogawa_bkhodeq_bof.rb | 3 ++- 3 files changed, 6 insertions(+), 3 deletions(-) diff --git a/modules/auxiliary/dos/scada/yokogawa_logsvr.rb b/modules/auxiliary/dos/scada/yokogawa_logsvr.rb index 8f11b42279..1fef0d305a 100644 --- a/modules/auxiliary/dos/scada/yokogawa_logsvr.rb +++ b/modules/auxiliary/dos/scada/yokogawa_logsvr.rb @@ -29,7 +29,8 @@ class Metasploit3 < Msf::Auxiliary 'References' => [ [ 'URL', 'http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0001E.pdf' ], - [ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities' ] + [ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities' ], + [ 'CVE', '2014-0781'] ], 'DisclosureDate' => 'Mar 10 2014', )) diff --git a/modules/exploits/windows/scada/yokogawa_bkbcopyd_bof.rb b/modules/exploits/windows/scada/yokogawa_bkbcopyd_bof.rb index 678dcb23e9..410eecec0d 100644 --- a/modules/exploits/windows/scada/yokogawa_bkbcopyd_bof.rb +++ b/modules/exploits/windows/scada/yokogawa_bkbcopyd_bof.rb @@ -26,7 +26,8 @@ class Metasploit3 < Msf::Exploit::Remote 'References' => [ [ 'URL', 'http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0001E.pdf' ], - [ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities' ] + [ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities' ], + [ 'CVE', '2014-0784'] ], 'Payload' => { diff --git a/modules/exploits/windows/scada/yokogawa_bkhodeq_bof.rb b/modules/exploits/windows/scada/yokogawa_bkhodeq_bof.rb index fc5144ec3f..cc6166ad9d 100644 --- a/modules/exploits/windows/scada/yokogawa_bkhodeq_bof.rb +++ b/modules/exploits/windows/scada/yokogawa_bkhodeq_bof.rb @@ -28,7 +28,8 @@ class Metasploit3 < Msf::Exploit::Remote 'References' => [ [ 'URL', 'http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0001E.pdf' ], - [ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities' ] + [ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities' ], + [ 'CVE', '2014-0783'] ], 'Payload' => {