From 70a45351d7935eb24662d38fcf3ecb4b9f96dcb5 Mon Sep 17 00:00:00 2001 From: Metasploit Date: Sat, 4 Aug 2018 05:41:15 -0700 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 28 +++++++++++++++++++++++++++- 1 file changed, 27 insertions(+), 1 deletion(-) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 65909ee6b8..41cb6bf910 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -6411,6 +6411,32 @@ "ref_name": "dos/scada/igss9_dataserver", "check": false }, + "auxiliary_dos/scada/siemens_siprotec4": { + "name": "Siemens SIPROTEC 4 and SIPROTEC Compact EN100 Ethernet Module - Denial of Service", + "full_name": "auxiliary/dos/scada/siemens_siprotec4", + "rank": 300, + "disclosure_date": null, + "type": "auxiliary", + "author": [ + "M. Can Kurnaz" + ], + "description": "This module sends a specially crafted packet to port 50000/UDP\n causing a denial of service of the affected (Siemens SIPROTEC 4 and SIPROTEC Compact < V4.25) devices.\n A manual reboot is required to return the device to service.\n CVE-2015-5374 and a CVSS v2 base score of 7.8 have been assigned to this vulnerability.", + "references": [ + "URL-https://www.exploit-db.com/exploits/44103/", + "URL-https://ics-cert.us-cert.gov/advisories/ICSA-15-202-01" + ], + "is_server": false, + "is_client": false, + "platform": "", + "arch": "", + "rport": 50000, + "targets": null, + "mod_time": "2018-03-13 09:30:48 +0000", + "path": "/modules/auxiliary/dos/scada/siemens_siprotec4.rb", + "is_install_path": true, + "ref_name": "dos/scada/siemens_siprotec4", + "check": false + }, "auxiliary_dos/scada/yokogawa_logsvr": { "name": "Yokogawa CENTUM CS 3000 BKCLogSvr.exe Heap Buffer Overflow", "full_name": "auxiliary/dos/scada/yokogawa_logsvr", @@ -31171,7 +31197,7 @@ "targets": [ "Automatic" ], - "mod_time": "2018-07-12 21:32:09 +0000", + "mod_time": "2018-08-03 01:39:37 +0000", "path": "/modules/exploits/linux/http/hadoop_unauth_exec.rb", "is_install_path": true, "ref_name": "linux/http/hadoop_unauth_exec",