ID

VAR-201109-0060


CVE

CVE-2011-0342


TITLE

InduSoft ISSymbol ActiveX Control Buffer Overflow Vulnerability

Trust: 0.8

sources: IVD: adacdf98-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3474

DESCRIPTION

Multiple buffer overflows in the InduSoft ISSymbol ActiveX control in ISSymbol.ocx 301.1104.601.0 in InduSoft Web Studio 7.0B2 hotfix 7.0.01.04 allow remote attackers to execute arbitrary code via a long parameter to the (1) Open, (2) Close, or (3) SetCurrentLanguage method. InduSoft ISSymbol ActiveX Control has a buffer overflow vulnerability. Due to boundary condition errors when processing 'Open()', 'Close()' and 'SetCurrentLanguage()' methods, it can be exploited by an attacker to cause a buffer overflow. Failed exploit attempts will likely result in denial-of-service conditions. ====================================================================== 2) Severity Rating: Highly critical Impact: System access Where: Remote ====================================================================== 3) Vendor's Description of Software "InduSoft Web Studio is a powerful collection of automation tools that provide all the automation building blocks to develop HMIs, SCADA systems and embedded instrumentation solutions. Utilize InduSoft integrated Web technologies to take advantage of Internet/intranet connectivity." Link: http://www.indusoft.com/indusoftart.php?catid=1&name=IWS/webstudio ====================================================================== 4) Description of Vulnerability Secunia Research has discovered multiple vulnerabilities in InduSoft ISSymbol ActiveX control, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities allows execution of arbitrary code. ====================================================================== 5) Solution Install Service Pack 1. ====================================================================== 6) Time Table 09/06/2011 - Vendor notified 15/06/2011 - Vendor response. 30/08/2011 - Vendor releases a hotfix. 01/09/2011 - Public disclosure. ====================================================================== 7) Credits Discovered by Dmitriy Pletnev, Secunia Research. ====================================================================== 8) References The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2011-0342 for the vulnerabilities. ====================================================================== 9) About Secunia Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration: http://secunia.com/advisories/business_solutions/ Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security. http://secunia.com/advisories/ Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general: http://secunia.com/secunia_research/ Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions: http://secunia.com/corporate/jobs/ Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/advisories/mailing_lists/ ====================================================================== 10) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2011-61/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ====================================================================== . ---------------------------------------------------------------------- The Secunia CSI 5.0 Beta - now available for testing Find out more, take a free test drive, and share your opinion with us: http://secunia.com/blog/242 ---------------------------------------------------------------------- TITLE: InduSoft ISSymbol ActiveX Control Multiple Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA44875 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44875/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44875 RELEASE DATE: 2011-09-02 DISCUSS ADVISORY: http://secunia.com/advisories/44875/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/44875/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=44875 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Secunia Research has discovered multiple vulnerabilities in InduSoft ISSymbol ActiveX control, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are confirmed in ISSymbol.ocx version 301.1104.601.0 included in InduSoft Web Studio version 7.0B2 hotfix 7.0.01.04. ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2011-61/ InduSoft: http://www.indusoft.com/hotfixes/hotfixes.php OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2011-0342 // JVNDB: JVNDB-2011-004092 // CNVD: CNVD-2011-3474 // BID: 49403 // IVD: adacdf98-2354-11e6-abef-000c29c66e3d // PACKETSTORM: 104681 // PACKETSTORM: 104720

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: adacdf98-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3474

AFFECTED PRODUCTS

vendor:indusoftmodel:web studioscope:eqversion:7.0b2

Trust: 1.6

vendor:schneider electricmodel:indusoft web studioscope:eqversion:7.0b2 hotfix 7.0.01.04

Trust: 0.8

vendor:indusoftmodel:issymbol activex controlscope: - version: -

Trust: 0.6

vendor:indusoftmodel:web studio 7.0b2 hotfixscope:eqversion:7.0.01.04

Trust: 0.6

vendor:indusoftmodel:web studio 7.0b2 hotfixscope:eqversion:7.0.01.

Trust: 0.3

vendor:indusoftmodel:issymbol activex controlscope:eqversion:301.1104.601.0

Trust: 0.3

vendor:web studiomodel:7.0b2scope: - version: -

Trust: 0.2

sources: IVD: adacdf98-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3474 // BID: 49403 // JVNDB: JVNDB-2011-004092 // CNNVD: CNNVD-201108-538 // NVD: CVE-2011-0342

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-0342
value: HIGH

Trust: 1.0

NVD: CVE-2011-0342
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201108-538
value: CRITICAL

Trust: 0.6

IVD: adacdf98-2354-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2011-0342
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: adacdf98-2354-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: adacdf98-2354-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2011-004092 // CNNVD: CNNVD-201108-538 // NVD: CVE-2011-0342

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2011-004092 // NVD: CVE-2011-0342

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201108-538

TYPE

Buffer overflow

Trust: 0.8

sources: IVD: adacdf98-2354-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201108-538

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-004092

PATCH

title:Security Updates and Hotfixesurl:http://www.indusoft.com/Login?returnurl=%2fProducts-Downloads%2fSecurity-Hotfix-Updates

Trust: 0.8

title:InduSoft ISSymbol ActiveX Control Buffer Overflow Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/4979

Trust: 0.6

sources: CNVD: CNVD-2011-3474 // JVNDB: JVNDB-2011-004092

EXTERNAL IDS

db:NVDid:CVE-2011-0342

Trust: 3.6

db:SECUNIAid:44875

Trust: 2.3

db:ICS CERTid:ICSA-11-273-02

Trust: 2.1

db:BIDid:49403

Trust: 1.9

db:CNVDid:CNVD-2011-3474

Trust: 0.8

db:CNNVDid:CNNVD-201108-538

Trust: 0.8

db:JVNDBid:JVNDB-2011-004092

Trust: 0.8

db:NSFOCUSid:17665

Trust: 0.6

db:IVDid:ADACDF98-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:104681

Trust: 0.1

db:PACKETSTORMid:104720

Trust: 0.1

sources: IVD: adacdf98-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3474 // BID: 49403 // JVNDB: JVNDB-2011-004092 // PACKETSTORM: 104681 // PACKETSTORM: 104720 // CNNVD: CNNVD-201108-538 // NVD: CVE-2011-0342

REFERENCES

url:http://secunia.com/secunia_research/2011-61/

Trust: 2.1

url:http://www.indusoft.com/hotfixes/hotfixes.php

Trust: 2.0

url:http://www.securityfocus.com/bid/49403

Trust: 1.6

url:http://secunia.com/advisories/44875

Trust: 1.6

url:http://www.us-cert.gov/control_systems/pdf/icsa-11-273-02.pdf

Trust: 1.1

url:http://ics-cert.us-cert.gov/advisories/icsa-11-273-02

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0342

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0342

Trust: 0.8

url:http://secunia.com/advisories/44875/

Trust: 0.7

url:http://www.nsfocus.net/vulndb/17665

Trust: 0.6

url:http://www.indusoft.com/

Trust: 0.3

url:http://www.indusoft.com/indusoftart.php?catid=1&name=iws/webstudio

Trust: 0.1

url:http://secunia.com/secunia_research/

Trust: 0.1

url:http://secunia.com/corporate/jobs/

Trust: 0.1

url:http://secunia.com/advisories/mailing_lists/

Trust: 0.1

url:http://secunia.com/advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0342

Trust: 0.1

url:http://secunia.com/blog/242

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/44875/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=44875

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2011-3474 // BID: 49403 // JVNDB: JVNDB-2011-004092 // PACKETSTORM: 104681 // PACKETSTORM: 104720 // CNNVD: CNNVD-201108-538 // NVD: CVE-2011-0342

CREDITS

Dmitriy Pletnev, Secunia Research.

Trust: 0.3

sources: BID: 49403

SOURCES

db:IVDid:adacdf98-2354-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2011-3474
db:BIDid:49403
db:JVNDBid:JVNDB-2011-004092
db:PACKETSTORMid:104681
db:PACKETSTORMid:104720
db:CNNVDid:CNNVD-201108-538
db:NVDid:CVE-2011-0342

LAST UPDATE DATE

2025-04-11T23:08:57.439000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-3474date:2011-09-02T00:00:00
db:BIDid:49403date:2011-09-30T22:50:00
db:JVNDBid:JVNDB-2011-004092date:2012-03-27T00:00:00
db:CNNVDid:CNNVD-201108-538date:2011-09-05T00:00:00
db:NVDid:CVE-2011-0342date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:adacdf98-2354-11e6-abef-000c29c66e3ddate:2011-09-02T00:00:00
db:CNVDid:CNVD-2011-3474date:2011-09-02T00:00:00
db:BIDid:49403date:2011-09-01T00:00:00
db:JVNDBid:JVNDB-2011-004092date:2012-03-27T00:00:00
db:PACKETSTORMid:104681date:2011-09-01T20:47:32
db:PACKETSTORMid:104720date:2011-09-01T09:03:00
db:CNNVDid:CNNVD-201108-538date:2011-09-02T00:00:00
db:NVDid:CVE-2011-0342date:2011-09-02T16:55:01.460