CVE-2018-10731
Summary
| CVE | CVE-2018-10731 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-05-17 19:29:00 UTC |
| Updated | 2018-06-20 17:38:00 UTC |
| Description | All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows when handling very large cookies (a different vulnerability than CVE-2018-10728). |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| PHOENIX CONTACT FL SWITCH 3xxx/4xxx/48xx series - Stack-based Buffer Overflow in shared object file — German (Germany) | CONFIRM | cert.vde.com | Patch, Third Party Advisory |
| PHOENIX CONTACT FL SWITCH 3xxx/4xxx/48xx Series | CISA | MISC | ics-cert.us-cert.gov | Patch, Third Party Advisory, US Government Resource |
| PHOENIX CONTACT FL SWITCH Series Multiple Security Vulnerabilities | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 590574 PHOENIX CONTACT FL SWITCH 3xxx/4xxx/48xx Series Multiple Vulnerabilities (ICSA-18-137-02)