cpe:/a:siemens:scalance_s_firmware:2.1.0 cpe:/a:siemens:scalance_s_firmware:2.2.0 cpe:/a:siemens:scalance_s_firmware:2.3.0 cpe:/h:siemens:scalance_s602:v2 cpe:/h:siemens:scalance_s612:v2 cpe:/h:siemens:scalance_s613:v2 CVE-2012-1800 2012-04-18T06:33:34.933-04:00 2012-11-19T23:44:07.500-05:00 6.1 ADJACENT_NETWORK LOW NONE NONE NONE COMPLETE http://nvd.nist.gov 2012-04-18T13:47:00.000-04:00 OSVDB 81034 CONFIRM http://support.automation.siemens.com/WW/view/en/59869684 CONFIRM http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-268149.pdf MISC http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-05.pdf Stack-based buffer overflow in the Profinet DCP protocol implementation on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 allows remote attackers to cause a denial of service (device outage) or possibly execute arbitrary code via a crafted DCP frame.