ID

VAR-201111-0141


CVE

CVE-2011-3996


TITLE

CSWorks LiveData Service vulnerable to denial-of-service (DoS)

Trust: 0.8

sources: JVNDB: JVNDB-2011-000095

DESCRIPTION

The LiveData Service in CSWorks before 2.0.4115.1 allows remote attackers to cause a denial of service (service crash) via crafted TCP packets. LiveData Service, a server component of CSWorks contains a denial-of-service (DoS) vulnerability. LiveData Service, a server component of CSWorks, contains an issue when processing TCP packets, which may lead to a denial-of-service (DoS). Kuang-Chun Hung of Security Research and Service Institute - Information and Communication Security Technology Center (ICST), Taiwan R.O.C reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.A remote attacker may be able to cause a denial-of-service (DoS). CSWorks is a web-based software architecture for building HMI/SCADA/M2M/EMI industrial automation. CSWorks versions prior to 2.0.4115.1 are affected. ---------------------------------------------------------------------- Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool. Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/ ---------------------------------------------------------------------- TITLE: CSWorks LiveData Service TCP Packets Processing Denial of Service Vulnerability SECUNIA ADVISORY ID: SA46625 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46625/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46625 RELEASE DATE: 2011-11-01 DISCUSS ADVISORY: http://secunia.com/advisories/46625/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/46625/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=46625 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in CSWorks, which can be exploited by malicious people to cause a DoS (Denial of Service). SOLUTION: Update to version 2.0.4115.1. ORIGINAL ADVISORY: CSWorks: http://www.controlsystemworks.com/blogengine/post/CSWorks-2041151-security-release.aspx JVN (English): http://jvn.jp/en/jp/JVN98649286/index.html http://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000095.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.7

sources: NVD: CVE-2011-3996 // JVNDB: JVNDB-2011-000095 // CNVD: CNVD-2011-4641 // BID: 50458 // IVD: 6c7950ce-2354-11e6-abef-000c29c66e3d // PACKETSTORM: 106478

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 6c7950ce-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-4641

AFFECTED PRODUCTS

vendor:controlsystemworksmodel:csworksscope:eqversion:1.4.3900.0

Trust: 1.6

vendor:controlsystemworksmodel:csworksscope:eqversion:1.7.5000.0

Trust: 1.6

vendor:controlsystemworksmodel:csworksscope:eqversion:1.4.3860.0

Trust: 1.6

vendor:controlsystemworksmodel:csworksscope:eqversion:1.0.601.0

Trust: 1.6

vendor:controlsystemworksmodel:csworksscope:eqversion:1.4.3850.0

Trust: 1.6

vendor:controlsystemworksmodel:csworksscope:eqversion:1.4.4000.0

Trust: 1.6

vendor:controlsystemworksmodel:csworksscope:eqversion:1.4.3830.0

Trust: 1.6

vendor:controlsystemworksmodel:csworksscope:eqversion:1.4.3880.0

Trust: 1.6

vendor:controlsystemworksmodel:csworksscope:eqversion:1.7.4050.0

Trust: 1.6

vendor:controlsystemworksmodel:csworksscope:eqversion:1.0.901.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:eqversion:1.1.3700.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:eqversion:1.0.3560.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:eqversion:1.4.3820.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:eqversion:1.0.623.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:eqversion:1.0.3580.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:eqversion:1.2.3800.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:eqversion:1.0.612.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:eqversion:1.2.3730.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:eqversion:1.1.3600.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:eqversion:1.0.813.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:eqversion:1.1.3674.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:lteversion:2.0.4115.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:eqversion:1.0.801.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:eqversion:1.0.720.0

Trust: 1.0

vendor:controlsystemworksmodel:csworksscope:eqversion:1.0.3540.0

Trust: 1.0

vendor:csworksmodel:csworksscope:lteversion:2.0.4115.0

Trust: 0.8

vendor:csworksmodel:csworksscope:ltversion:2.0.4115.1

Trust: 0.6

vendor:controlsystemworksmodel:csworksscope:eqversion:2.0.4115.0

Trust: 0.6

vendor:csworksmodel:csworksscope:eqversion:2.0.41150

Trust: 0.3

vendor:csworksmodel:csworksscope:neversion:2.0.41151

Trust: 0.3

vendor:csworksmodel: - scope:eqversion:1.0.601.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.0.612.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.0.623.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.0.720.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.0.801.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.0.813.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.0.901.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.0.3540.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.0.3560.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.0.3580.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.1.3600.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.1.3674.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.1.3700.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.2.3730.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.2.3800.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.4.3820.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.4.3830.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.4.3850.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.4.3860.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.4.3880.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.4.3900.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.4.4000.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.7.4050.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:1.7.5000.0

Trust: 0.2

vendor:csworksmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 6c7950ce-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-4641 // BID: 50458 // JVNDB: JVNDB-2011-000095 // CNNVD: CNNVD-201111-048 // NVD: CVE-2011-3996

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3996
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2011-000095
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201111-048
value: MEDIUM

Trust: 0.6

IVD: 6c7950ce-2354-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2011-3996
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2011-000095
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IVD: 6c7950ce-2354-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 6c7950ce-2354-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2011-000095 // CNNVD: CNNVD-201111-048 // NVD: CVE-2011-3996

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.0

sources: NVD: CVE-2011-3996

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201111-048

TYPE

Resource management error

Trust: 0.8

sources: IVD: 6c7950ce-2354-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201111-048

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-000095

PATCH

title:Important: CSWorks 2.0.4115.1 security releaseurl:http://www.controlsystemworks.com/blogengine/post/CSWorks-2041151-security-release.aspx

Trust: 0.8

title:Release Historyurl:http://www.controlsystemworks.com/ProductHistory.aspx

Trust: 0.8

title:CSWorks LiveData service TCP packet processing denial of service vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/5749

Trust: 0.6

sources: CNVD: CNVD-2011-4641 // JVNDB: JVNDB-2011-000095

EXTERNAL IDS

db:NVDid:CVE-2011-3996

Trust: 3.5

db:JVNid:JVN98649286

Trust: 2.8

db:SECUNIAid:46625

Trust: 2.5

db:JVNDBid:JVNDB-2011-000095

Trust: 2.5

db:BIDid:50458

Trust: 1.3

db:CNVDid:CNVD-2011-4641

Trust: 0.8

db:CNNVDid:CNNVD-201111-048

Trust: 0.8

db:JVNid:JVN#98649286

Trust: 0.6

db:IVDid:6C7950CE-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:106478

Trust: 0.1

sources: IVD: 6c7950ce-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-4641 // BID: 50458 // JVNDB: JVNDB-2011-000095 // PACKETSTORM: 106478 // CNNVD: CNNVD-201111-048 // NVD: CVE-2011-3996

REFERENCES

url:http://jvn.jp/en/jp/jvn98649286/index.html

Trust: 2.8

url:http://www.controlsystemworks.com/blogengine/post/csworks-2041151-security-release.aspx

Trust: 2.0

url:http://www.controlsystemworks.com/producthistory.aspx

Trust: 1.6

url:http://secunia.com/advisories/46625

Trust: 1.6

url:http://jvndb.jvn.jp/jvndb/jvndb-2011-000095

Trust: 1.6

url:http://www.securityfocus.com/bid/50458

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/71079

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3996

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3996

Trust: 0.8

url:http://secunia.com/advisories/46625/http

Trust: 0.6

url:http://www.controlsystemworks.com/

Trust: 0.3

url:http://secunia.com/advisories/46625/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46625

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://jvndb.jvn.jp/en/contents/2011/jvndb-2011-000095.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/46625/#comments

Trust: 0.1

url:http://secunia.com/products/corporate/vim/ovum_2011_request/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2011-4641 // BID: 50458 // JVNDB: JVNDB-2011-000095 // PACKETSTORM: 106478 // CNNVD: CNNVD-201111-048 // NVD: CVE-2011-3996

CREDITS

Kuang-Chun Hung, Security Research and Service Institute - Information and Communication Security Technology Center (ICST), Taiwan R.O.C

Trust: 0.3

sources: BID: 50458

SOURCES

db:IVDid:6c7950ce-2354-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2011-4641
db:BIDid:50458
db:JVNDBid:JVNDB-2011-000095
db:PACKETSTORMid:106478
db:CNNVDid:CNNVD-201111-048
db:NVDid:CVE-2011-3996

LAST UPDATE DATE

2025-04-11T23:17:24.603000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-4641date:2011-11-02T00:00:00
db:BIDid:50458date:2011-10-27T00:00:00
db:JVNDBid:JVNDB-2011-000095date:2011-11-02T00:00:00
db:CNNVDid:CNNVD-201111-048date:2011-11-04T00:00:00
db:NVDid:CVE-2011-3996date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:6c7950ce-2354-11e6-abef-000c29c66e3ddate:2011-11-02T00:00:00
db:CNVDid:CNVD-2011-4641date:2011-11-02T00:00:00
db:BIDid:50458date:2011-10-27T00:00:00
db:JVNDBid:JVNDB-2011-000095date:2011-11-01T00:00:00
db:PACKETSTORMid:106478date:2011-11-01T03:28:20
db:CNNVDid:CNNVD-201111-048date:2011-11-04T00:00:00
db:NVDid:CVE-2011-3996date:2011-11-03T17:55:01.887