This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
The remote host has software installed that is affected by multiple
The remote host has a version of Siemens Automation License Manager
installed that is affected by the following vulnerabilities :
- There are multiple buffer overflows that can be
exploited to execute arbitrary code by sending a message
to the Automation License Manager TCP service listening
on port 4410 containing a long serialid field in a
_licensekey command. (CVE-2011-4329)
- The Siemens Automation License Manager TCP service
listening on TCP port 4410 does not properly copy fields
obtained from clients and can be exploited by sending a
message containing long fields to cause a denial of
- By sending a specially crafted 'get_target_ocx_param' or
'send_target_ocx_param' command message to the
Automation License Manager service listening on port
4410, an attacker can trigger a NULL pointer dereference
and denial of service. (CVE-2011-4531)
See also :
Upgrade to Siemens Automation License Manager 5.1+SP1+Upd2 or later.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true
Nessus Plugin ID: 63428 ()
Bugtraq ID: 50830
CVE ID: CVE-2011-4529CVE-2011-4530CVE-2011-4531
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.