ID

VAR-200801-0249


CVE

CVE-2008-0176


TITLE

GE-Fanuc CIMPLICITY w32rtr.exe Remote Heap Overflow Vulnerability

Trust: 1.0

sources: IVD: 067d2766-2352-11e6-abef-000c29c66e3d // IVD: 7d7ae201-463f-11e9-819f-000c29342cb1 // CNVD: CNVD-2008-0434

DESCRIPTION

Heap-based buffer overflow in w32rtr.exe in GE Fanuc CIMPLICITY HMI SCADA system 7.0 before 7.0 SIM 9, and earlier versions before 6.1 SP6 Hot fix - 010708_162517_6106, allow remote attackers to execute arbitrary code via unknown vectors. GE Fanuc CIMPLICITY HMI Contains a heap buffer overflow vulnerability. GE Fanuc CIMPLICITY HMI Is a product used for monitoring and controlling production information systems. this CIMPLICITY Network service processes (w32rtr.exe) Contains a heap buffer overflow vulnerability on both the server and the client. Attackers have this vulnerability CIMPLICITY HMI This vulnerability could be exploited by sending crafted packets to the system.Arbitrary code execution or denial of service by a remote attacker (DoS) There is a possibility of being attacked.  GE Fanuc CIMPLICITY has a vulnerability in processing malformed requests. Remote attackers could use this vulnerability to control servers. An attacker can exploit this issue to execute arbitrary code or cause denial-of-service conditions. Versions prior to CIMPLICITY 7.0 SIM 9 are vulnerable. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Proficy HMI/SCADA - CIMPLICITY w32rtr.exe Packet Processing Buffer Overflow SECUNIA ADVISORY ID: SA28663 VERIFY ADVISORY: http://secunia.com/advisories/28663/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From local network SOFTWARE: Proficy HMI/SCADA - CIMPLICITY 6.x http://secunia.com/product/11105/ Proficy HMI/SCADA - CIMPLICITY 7.x http://secunia.com/product/17337/ DESCRIPTION: Eyal Udassin has reported a vulnerability in Proficy HMI/SCADA - CIMPLICITY, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. The vulnerability is caused due to a boundary error in w32rtr.exe when processing packets and can be exploited to cause a heap-based buffer overflow by sending a specially-crafted packet to default port 32000/TCP. The vulnerability is reported in version 6.1. SOLUTION: Apply hotfixes. Please see the vendor's advisory for details. * CIMPLICITY 6.1 SP6 Hot Fix - 010708_162517_6106 * CIMPLICITY 7.0 SIM 9 PROVIDED AND/OR DISCOVERED BY: Eyal Udassin, C4 Security ORIGINAL ADVISORY: GE Fanuc (KB12458): http://support.gefanuc.com/support/index?page=kbchannel&id=KB12458 C4 Security (via BugTraq): http://archives.neohapsis.com/archives/bugtraq/2008-01/0372.html OTHER REFERENCES: US-CERT VU#308556: http://www.kb.cert.org/vuls/id/308556 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Background ----------------- Vendor product information: CIMPLICITY is a powerful and technically advanced HMI/SCADA product. With its open system design approach, true client/server architecture, and the latest web technologies, CIMPLICITY allows you to realize the benefits of digitization for the collection, monitoring, supervisory control and sharing of critical process and production data throughout your operations CIMPLICITY has been used in all industries -- from process to discrete, to system monitoring. It is extremely well suited for discrete applications, and handles very large amounts of digital signals and alarm bursts. Its advanced Client/Sever architecture makes it easy to start small and expand your system. The description of the vulnerability is intentionally limited as this software controls critical national infrastructure. Impact ---------- An attacker can compromise the Cimplicity 6.1 control server, and each of the operator workstations. Workaround/Fix ----------------------- The vendor issued a hotfix to resolve this vulnerability Additional Information ------------------------------- For additional information please contact us at info@c4-security.com. Note that we will respond only to verified utility personnel and governmental agencies. The CVE identifier assigned to this vulnerability by CERT is CVE-2008-0176 Credit -------- This vulnerability was discovered and exploited by Gilad Bakas and Eyal Udassin of C4. Regards, Eyal Udassin - C4 (Formerly Swift Coders) 33 Jabotinsky St. The Twin Towers #1, Ramat Gan, Israel eyal.udassin@c4-security.com / www.c4-security.com <http://www.c4-security.com/> +972-547-684989

Trust: 3.69

sources: NVD: CVE-2008-0176 // CERT/CC: VU#308556 // JVNDB: JVNDB-2008-001054 // CNVD: CNVD-2008-0434 // BID: 27447 // IVD: 067d2766-2352-11e6-abef-000c29c66e3d // IVD: 7d7ae201-463f-11e9-819f-000c29342cb1 // PACKETSTORM: 63057 // PACKETSTORM: 63004

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 067d2766-2352-11e6-abef-000c29c66e3d // IVD: 7d7ae201-463f-11e9-819f-000c29342cb1 // CNVD: CNVD-2008-0434

AFFECTED PRODUCTS

vendor:ge fanucmodel:cimplicityscope:lteversion:7.0_sim8

Trust: 1.0

vendor:ge fanucmodel:cimplicityscope:lteversion:6.1_sp6_hf_010708_162517_6106

Trust: 1.0

vendor:cimplicitymodel: - scope:eqversion:*

Trust: 0.8

vendor:ge fanucmodel: - scope: - version: -

Trust: 0.8

vendor:ge fanucmodel:cimplicityscope:lteversion:7.0

Trust: 0.8

vendor:nonemodel: - scope: - version: -

Trust: 0.6

vendor:ge fanucmodel:cimplicityscope:eqversion:6.1_sp6_hf_010708_162517_6106

Trust: 0.6

vendor:ge fanucmodel:cimplicityscope:eqversion:7.0_sim8

Trust: 0.6

vendor:gemodel:fanuc cimplicity sim8scope:eqversion:7.0

Trust: 0.3

vendor:gemodel:fanuc cimplicity sim7scope:eqversion:7.0

Trust: 0.3

vendor:gemodel:fanuc cimplicity sp6scope:eqversion:6.1

Trust: 0.3

vendor:gemodel:fanuc cimplicity sp5scope:eqversion:6.1

Trust: 0.3

vendor:gemodel:fanuc cimplicityscope:eqversion:6.1

Trust: 0.3

vendor:gemodel:fanuc cimplicityscope:eqversion:6.0

Trust: 0.3

vendor:gemodel:fanuc cimplicityscope:eqversion:0

Trust: 0.3

vendor:gemodel:fanuc cimplicity sim9scope:neversion:7.0

Trust: 0.3

sources: IVD: 067d2766-2352-11e6-abef-000c29c66e3d // IVD: 7d7ae201-463f-11e9-819f-000c29342cb1 // CERT/CC: VU#308556 // CNVD: CNVD-2008-0434 // BID: 27447 // JVNDB: JVNDB-2008-001054 // CNNVD: CNNVD-200801-410 // NVD: CVE-2008-0176

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0176
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#308556
value: 3.01

Trust: 0.8

NVD: CVE-2008-0176
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200801-410
value: CRITICAL

Trust: 0.6

IVD: 067d2766-2352-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 7d7ae201-463f-11e9-819f-000c29342cb1
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2008-0176
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 067d2766-2352-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 7d7ae201-463f-11e9-819f-000c29342cb1
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 067d2766-2352-11e6-abef-000c29c66e3d // IVD: 7d7ae201-463f-11e9-819f-000c29342cb1 // CERT/CC: VU#308556 // JVNDB: JVNDB-2008-001054 // CNNVD: CNNVD-200801-410 // NVD: CVE-2008-0176

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2008-001054 // NVD: CVE-2008-0176

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200801-410

TYPE

Buffer overflow

Trust: 1.0

sources: IVD: 067d2766-2352-11e6-abef-000c29c66e3d // IVD: 7d7ae201-463f-11e9-819f-000c29342cb1 // CNNVD: CNNVD-200801-410

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001054

PATCH

title:Securing Your HMI/SCADA Systemsurl:http://www.gefanuc.com/as_en/gefanuc/resource_center/hmi_scada/hmiscada_security.html

Trust: 0.8

title:KB12458url:http://support.gefanuc.com/support/index?page=kbchannel&id=KB12458

Trust: 0.8

sources: JVNDB: JVNDB-2008-001054

EXTERNAL IDS

db:NVDid:CVE-2008-0176

Trust: 3.8

db:CERT/CCid:VU#308556

Trust: 3.0

db:BIDid:27447

Trust: 2.7

db:SECUNIAid:28663

Trust: 2.6

db:SECTRACKid:1019275

Trust: 2.4

db:VUPENid:ADV-2008-0306

Trust: 1.6

db:SREASONid:3592

Trust: 1.6

db:CNVDid:CNVD-2008-0434

Trust: 1.0

db:CNNVDid:CNNVD-200801-410

Trust: 1.0

db:JVNDBid:JVNDB-2008-001054

Trust: 0.8

db:BUGTRAQid:20080125 C4 SECURITY ADVISORY - GE FANUC CIMPLICITY 6.1 HEAP OVERFLOW

Trust: 0.6

db:BUGTRAQid:20080129 RE: C4 SECURITY ADVISORY - GE FANUC CIMPLICITY 6.1 HEAP OVERFLOW

Trust: 0.6

db:IVDid:067D2766-2352-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:7D7AE201-463F-11E9-819F-000C29342CB1

Trust: 0.2

db:PACKETSTORMid:63057

Trust: 0.1

db:PACKETSTORMid:63004

Trust: 0.1

sources: IVD: 067d2766-2352-11e6-abef-000c29c66e3d // IVD: 7d7ae201-463f-11e9-819f-000c29342cb1 // CERT/CC: VU#308556 // CNVD: CNVD-2008-0434 // BID: 27447 // JVNDB: JVNDB-2008-001054 // PACKETSTORM: 63057 // PACKETSTORM: 63004 // CNNVD: CNNVD-200801-410 // NVD: CVE-2008-0176

REFERENCES

url:http://support.gefanuc.com/support/index?page=kbchannel&id=kb12458

Trust: 2.8

url:http://secunia.com/advisories/28663

Trust: 2.4

url:http://www.securityfocus.com/bid/27447

Trust: 2.4

url:http://www.securitytracker.com/id?1019275

Trust: 2.4

url:http://www.kb.cert.org/vuls/id/308556

Trust: 2.2

url:http://securityreason.com/securityalert/3592

Trust: 1.6

url:http://www.frsirt.com/english/advisories/2008/0306

Trust: 1.4

url:http://www.vupen.com/english/advisories/2008/0306

Trust: 1.0

url:http://www.securityfocus.com/archive/1/487076/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/archive/1/487241/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/archive/1/487076/30/0/threaded

Trust: 0.8

url:http://www.gefanuc.com/as_en/gefanuc/resource_center/hmi_scada/hmiscada_security.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0176

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23308556/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0176

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/487076/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/487241/100/0/threaded

Trust: 0.6

url:http://www.gefanuc.com/as_en/products_solutions/hmi_scada/products/proficy_cimplicity.html

Trust: 0.3

url:/archive/1/487076

Trust: 0.3

url:/archive/1/487241

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/11105/

Trust: 0.1

url:http://secunia.com/advisories/28663/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/17337/

Trust: 0.1

url:http://archives.neohapsis.com/archives/bugtraq/2008-01/0372.html

Trust: 0.1

url:http://www.c4-security.com/>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0176

Trust: 0.1

sources: CERT/CC: VU#308556 // BID: 27447 // JVNDB: JVNDB-2008-001054 // PACKETSTORM: 63057 // PACKETSTORM: 63004 // CNNVD: CNNVD-200801-410 // NVD: CVE-2008-0176

CREDITS

Douglas A. Stewart of CERT as well as Gilad Bakas and Eyal Udassin of C4 are credited with the discovery of this vulnerability.

Trust: 0.9

sources: BID: 27447 // CNNVD: CNNVD-200801-410

SOURCES

db:IVDid:067d2766-2352-11e6-abef-000c29c66e3d
db:IVDid:7d7ae201-463f-11e9-819f-000c29342cb1
db:CERT/CCid:VU#308556
db:CNVDid:CNVD-2008-0434
db:BIDid:27447
db:JVNDBid:JVNDB-2008-001054
db:PACKETSTORMid:63057
db:PACKETSTORMid:63004
db:CNNVDid:CNNVD-200801-410
db:NVDid:CVE-2008-0176

LAST UPDATE DATE

2025-04-10T23:16:41.721000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#308556date:2008-01-25T00:00:00
db:CNVDid:CNVD-2008-0434date:2008-01-24T00:00:00
db:BIDid:27447date:2008-01-29T16:27:00
db:JVNDBid:JVNDB-2008-001054date:2008-02-07T00:00:00
db:CNNVDid:CNNVD-200801-410date:2008-09-05T00:00:00
db:NVDid:CVE-2008-0176date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:IVDid:067d2766-2352-11e6-abef-000c29c66e3ddate:2008-01-24T00:00:00
db:IVDid:7d7ae201-463f-11e9-819f-000c29342cb1date:2008-01-24T00:00:00
db:CERT/CCid:VU#308556date:2008-01-25T00:00:00
db:CNVDid:CNVD-2008-0434date:2008-01-24T00:00:00
db:BIDid:27447date:2008-01-24T00:00:00
db:JVNDBid:JVNDB-2008-001054date:2008-02-07T00:00:00
db:PACKETSTORMid:63057date:2008-01-29T00:00:58
db:PACKETSTORMid:63004date:2008-01-26T00:10:20
db:CNNVDid:CNNVD-200801-410date:2008-01-28T00:00:00
db:NVDid:CVE-2008-0176date:2008-01-29T02:00:00