ID

VAR-201103-0157


CVE

CVE-2011-0331


TITLE

Honeywell ScanServer ActiveX Control addOSPLext Vulnerability in arbitrary code execution in method

Trust: 0.8

sources: JVNDB: JVNDB-2011-004088

DESCRIPTION

Use-after-free vulnerability in the addOSPLext method in the Honeywell ScanServer ActiveX control 780.0.20.5 allows remote attackers to execute arbitrary code via a crafted HTML document. When processing the \"addOSPLext()\" method, there is a post-release error. The Honeywell ScanServer ActiveX control is prone to a remote code-execution vulnerability. An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Honeywell ScanServer ActiveX control 780.0.20.5 is vulnerable; other versions may also be affected. ---------------------------------------------------------------------- Meet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March). http://secunia.com/company/events/mms_2011/ ---------------------------------------------------------------------- TITLE: Honeywell ScanServer ActiveX Control Use-After-Free Vulnerability SECUNIA ADVISORY ID: SA43360 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43360/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43360 RELEASE DATE: 2011-03-22 DISCUSS ADVISORY: http://secunia.com/advisories/43360/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/43360/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=43360 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Secunia Research has discovered a vulnerability in Honeywell ScanServer ActiveX Control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a use-after-free error when handling the "addOSPLext()" method and can be exploited to dereference already freed memory via a specially crafted web page. The vulnerability is confirmed in version 780.0.20.5. PROVIDED AND/OR DISCOVERED BY: Carsten Eiram, Secunia Research. ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2011-22/ OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2011-0331 // JVNDB: JVNDB-2011-004088 // CNVD: CNVD-2011-1163 // BID: 46930 // IVD: 25b062c6-2355-11e6-abef-000c29c66e3d // VULMON: CVE-2011-0331 // PACKETSTORM: 99596

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 25b062c6-2355-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-1163

AFFECTED PRODUCTS

vendor:honeywellmodel:scanserver activex controlscope:eqversion:780.0.20.5

Trust: 3.3

vendor:scanserver activex controlmodel: - scope:eqversion:780.0.20.5

Trust: 0.2

sources: IVD: 25b062c6-2355-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-1163 // BID: 46930 // JVNDB: JVNDB-2011-004088 // CNNVD: CNNVD-201103-276 // NVD: CVE-2011-0331

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-0331
value: HIGH

Trust: 1.0

NVD: CVE-2011-0331
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201103-276
value: CRITICAL

Trust: 0.6

IVD: 25b062c6-2355-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

VULMON: CVE-2011-0331
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-0331
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

IVD: 25b062c6-2355-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 25b062c6-2355-11e6-abef-000c29c66e3d // VULMON: CVE-2011-0331 // JVNDB: JVNDB-2011-004088 // CNNVD: CNNVD-201103-276 // NVD: CVE-2011-0331

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.8

sources: JVNDB: JVNDB-2011-004088 // NVD: CVE-2011-0331

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201103-276

TYPE

Resource management error

Trust: 0.8

sources: IVD: 25b062c6-2355-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201103-276

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-004088

PATCH

title:Top Pageurl:http://honeywell.com/Pages/Home.aspx

Trust: 0.8

sources: JVNDB: JVNDB-2011-004088

EXTERNAL IDS

db:NVDid:CVE-2011-0331

Trust: 3.6

db:BIDid:46930

Trust: 2.0

db:SECUNIAid:43360

Trust: 1.8

db:OSVDBid:71249

Trust: 1.1

db:VUPENid:ADV-2011-0725

Trust: 1.0

db:CNVDid:CNVD-2011-1163

Trust: 0.8

db:CNNVDid:CNNVD-201103-276

Trust: 0.8

db:ICS CERTid:ICSA-11-103-01A

Trust: 0.8

db:JVNDBid:JVNDB-2011-004088

Trust: 0.8

db:NSFOCUSid:16614

Trust: 0.6

db:IVDid:25B062C6-2355-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VUPENid:2011/0725

Trust: 0.1

db:VULMONid:CVE-2011-0331

Trust: 0.1

db:PACKETSTORMid:99596

Trust: 0.1

sources: IVD: 25b062c6-2355-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-1163 // VULMON: CVE-2011-0331 // BID: 46930 // JVNDB: JVNDB-2011-004088 // PACKETSTORM: 99596 // CNNVD: CNNVD-201103-276 // NVD: CVE-2011-0331

REFERENCES

url:http://secunia.com/secunia_research/2011-22/

Trust: 2.7

url:http://www.securityfocus.com/bid/46930

Trust: 1.8

url:http://secunia.com/advisories/43360

Trust: 1.7

url:http://osvdb.org/71249

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0725

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0331

Trust: 0.8

url:http://www.us-cert.gov/control_systems/pdf/icsa-11-103-01a.pdf

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0331

Trust: 0.8

url:http://www.nsfocus.net/vulndb/16614

Trust: 0.6

url:http://www.microsoft.com/technet/security/advisory/2562937.mspx

Trust: 0.3

url:http://www.honeywell.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://secunia.com/advisories/43360/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43360

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/company/events/mms_2011/

Trust: 0.1

url:http://secunia.com/advisories/43360/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2011-1163 // VULMON: CVE-2011-0331 // BID: 46930 // JVNDB: JVNDB-2011-004088 // PACKETSTORM: 99596 // CNNVD: CNNVD-201103-276 // NVD: CVE-2011-0331

CREDITS

Carsten Eiram, Secunia Research.

Trust: 0.3

sources: BID: 46930

SOURCES

db:IVDid:25b062c6-2355-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2011-1163
db:VULMONid:CVE-2011-0331
db:BIDid:46930
db:JVNDBid:JVNDB-2011-004088
db:PACKETSTORMid:99596
db:CNNVDid:CNNVD-201103-276
db:NVDid:CVE-2011-0331

LAST UPDATE DATE

2025-04-11T23:07:34.599000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-1163date:2011-03-22T00:00:00
db:VULMONid:CVE-2011-0331date:2011-04-09T00:00:00
db:BIDid:46930date:2011-08-18T15:50:00
db:JVNDBid:JVNDB-2011-004088date:2012-03-27T00:00:00
db:CNNVDid:CNNVD-201103-276date:2011-03-31T00:00:00
db:NVDid:CVE-2011-0331date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:25b062c6-2355-11e6-abef-000c29c66e3ddate:2011-03-22T00:00:00
db:CNVDid:CNVD-2011-1163date:2011-03-22T00:00:00
db:VULMONid:CVE-2011-0331date:2011-03-22T00:00:00
db:BIDid:46930date:2011-03-21T00:00:00
db:JVNDBid:JVNDB-2011-004088date:2012-03-27T00:00:00
db:PACKETSTORMid:99596date:2011-03-22T12:00:05
db:CNNVDid:CNNVD-201103-276date:2011-03-23T00:00:00
db:NVDid:CVE-2011-0331date:2011-03-22T17:55:01.253