diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index cbbd12ef11..b2e9a074d0 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -121417,14 +121417,18 @@ "disclosure_date": "2018-07-02", "type": "exploit", "author": [ + "ZDI", "t4rkd3vilz", "hubertwslin" ], "description": "This module exploits a stack based buffer overflow in Delta Electronics Delta Industrial\n Automation COMMGR 1.08. The vulnerability exists in COMMGR.exe when handling specially\n crafted packets. This module has been tested successfully on Delta Electronics Delta\n Industrial Automation COMMGR 1.08 over\n Windows XP SP3,\n Windows 7 SP1, and\n Windows 8.1.", "references": [ - "EDB-44965", "CVE-2018-10594", - "ZDI-18-588" + "BID-104529", + "ZDI-18-586", + "ZDI-18-588", + "EDB-44965", + "URL-https://ics-cert.us-cert.gov/advisories/ICSA-18-172-01" ], "is_server": true, "is_client": false, @@ -121440,7 +121444,7 @@ "targets": [ "COMMGR 1.08 / Windows Universal" ], - "mod_time": "2018-10-08 13:48:52 +0000", + "mod_time": "2018-10-08 14:15:21 +0000", "path": "/modules/exploits/windows/scada/delta_ia_commgr_bof.rb", "is_install_path": true, "ref_name": "windows/scada/delta_ia_commgr_bof", @@ -146803,7 +146807,7 @@ ], "is_server": false, "is_client": false, - "platform": "AIX,Android,Apple_iOS,BSD,BSDi,Cisco,Firefox,FreeBSD,HPUX,Hardware,Irix,Java,JavaScript,Juniper,Linux,Mainframe,Multi,NetBSD,Netware,NodeJS,OSX,OpenBSD,PHP,Python,R,Ruby,Solaris,Unix,Windows", + "platform": "AIX,Android,Apple_iOS,BSD,BSDi,Cisco,Firefox,FreeBSD,HPUX,Hardware,Irix,Java,JavaScript,Juniper,Linux,Mainframe,Multi,NetBSD,Netware,NodeJS,OSX,OpenBSD,PHP,Python,R,Ruby,Solaris,Unix,Unknown,Windows", "arch": "", "rport": null, "autofilter_ports": null,