7.8
CVSSv2

CVE-2011-2956

Published: 28/07/2011 Updated: 29/07/2011
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 785
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

AzeoTech DAQFactory prior to 5.85 (Build 1842) does not perform authentication for certain signals, which allows remote malicious users to cause a denial of service (system reboot or shutdown) via a signal.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

azeotech daqfactory 5.73

azeotech daqfactory 5.39

azeotech daqfactory 5.38

azeotech daqfactory 5.70

azeotech daqfactory 5.12

azeotech daqfactory 5.15

azeotech daqfactory 5.10

azeotech daqfactory 5.11

azeotech daqfactory 3.5

azeotech daqfactory 3.11

azeotech daqfactory 3.10

azeotech daqfactory 4.00

azeotech daqfactory 5.83

azeotech daqfactory 5.76

azeotech daqfactory 5.75

azeotech daqfactory 5.79

azeotech daqfactory 5.78

azeotech daqfactory 5.36

azeotech daqfactory 5.37

azeotech daqfactory 5.34

azeotech daqfactory 5.35

azeotech daqfactory 5.0

azeotech daqfactory 4.11

azeotech daqfactory 4.10

azeotech daqfactory

azeotech daqfactory 5.72

azeotech daqfactory 5.74

azeotech daqfactory 5.40

azeotech daqfactory 5.80

azeotech daqfactory 5.04

azeotech daqfactory 5.02

azeotech daqfactory 5.33

azeotech daqfactory 5.31

azeotech daqfactory 3.09

azeotech daqfactory 3.03

azeotech daqfactory 3.51

azeotech daqfactory 3.55

azeotech daqfactory 3.52

azeotech daqfactory 5.77

azeotech daqfactory 5.71

azeotech daqfactory 5.82

azeotech daqfactory 5.05

azeotech daqfactory 5.03

azeotech daqfactory 5.32

azeotech daqfactory 5.30

azeotech daqfactory 3.05

azeotech daqfactory 3.0

azeotech daqfactory 3.53

azeotech daqfactory 5.01

Exploits

source: wwwsecurityfocuscom/bid/48955/info AzeoTech DAQFactory is prone to a denial-of-service vulnerability Attackers can exploit this issue to cause the application to crash, denying service to legitimate users Versions prior to DAQFactory 585 are vulnerable The following exploit requests are available: preamble: "\x01\x00\x09 ...