ID

VAR-201201-0165


CVE

CVE-2011-4053


TITLE

7-Technologies Interactive Graphical SCADA System Vulnerability gained in

Trust: 0.8

sources: JVNDB: JVNDB-2012-001111

DESCRIPTION

Untrusted search path vulnerability in 7-Technologies (7T) Interactive Graphical SCADA System (IGSS) before 9.0.0.11291 allows local users to gain privileges via a Trojan horse DLL in the current working directory. DLL It may be possible to get permission through the file. The 7T Interactive Graphical SCADA System is an automated monitoring and control system. Applications can't safely load parts of the library, and an attacker can build malicious files that entice a user to open on a remote WebDAV or SMB share, and can execute arbitrary code in the user context. 7T Interactive Graphical SCADA System is prone to a vulnerability which allows attackers to execute arbitrary code. ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: 7-Technologies Interactive Graphical SCADA System Insecure Library Loading Vulnerability SECUNIA ADVISORY ID: SA47558 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47558/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47558 RELEASE DATE: 2012-01-17 DISCUSS ADVISORY: http://secunia.com/advisories/47558/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47558/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47558 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in 7-Technologies Interactive Graphical SCADA System, which can be exploited by malicious people to compromise a user's system. Successful exploitation may allow execution of arbitrary code. The vulnerability is reported in versions prior to 9.0.0.11291. SOLUTION: Update to version 9.0.0.11291. PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Kuang-Chun Hung, Information and Communication Security Technology Center. ORIGINAL ADVISORY: ICS-CERT (ICSA-11-353-01): http://www.us-cert.gov/control_systems/pdf/ICSA-11-353-01.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.7

sources: NVD: CVE-2011-4053 // JVNDB: JVNDB-2012-001111 // CNVD: CNVD-2012-0177 // BID: 51438 // IVD: 33632ae4-2354-11e6-abef-000c29c66e3d // PACKETSTORM: 108779

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 33632ae4-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-0177

AFFECTED PRODUCTS

vendor:7tmodel:igssscope:eqversion:6

Trust: 1.6

vendor:7tmodel:igssscope:eqversion:4.1

Trust: 1.6

vendor:7tmodel:igssscope:eqversion:2.0

Trust: 1.6

vendor:7tmodel:igssscope:eqversion:3.0

Trust: 1.6

vendor:7tmodel:igssscope:eqversion:5.0

Trust: 1.6

vendor:7tmodel:igssscope:eqversion:8

Trust: 1.6

vendor:7tmodel:igssscope:eqversion:7

Trust: 1.6

vendor:7tmodel:igssscope:eqversion:9

Trust: 1.6

vendor:7tmodel:igssscope:eqversion:5.1

Trust: 1.6

vendor:7tmodel:igssscope:lteversion:9.0.0.11200

Trust: 1.0

vendor:7tmodel:igssscope:eqversion:9.0.0.11129

Trust: 1.0

vendor:7model:interactive graphical scada systemscope:ltversion:9.0.0.11291

Trust: 0.8

vendor:7model:interactive graphical scada systemscope:eqversion:9.x

Trust: 0.6

vendor:7tmodel:igssscope:eqversion:9.0.0.11200

Trust: 0.6

vendor:7model:interactive graphical scada systemscope:eqversion:9.0.0.11200

Trust: 0.3

vendor:7model:interactive graphical scada systemscope:eqversion:9.0.0.11143

Trust: 0.3

vendor:7model:interactive graphical scada systemscope:eqversion:9.0.0.11129

Trust: 0.3

vendor:7model:interactive graphical scada systemscope:eqversion:9

Trust: 0.3

vendor:7model:interactive graphical scada systemscope:eqversion:8

Trust: 0.3

vendor:7model:interactive graphical scada systemscope:eqversion:7

Trust: 0.3

vendor:7model:interactive graphical scada systemscope:eqversion:0

Trust: 0.3

vendor:7model:interactive graphical scada systemscope:neversion:9.0.0.11291

Trust: 0.3

vendor:igssmodel: - scope:eqversion:2.0

Trust: 0.2

vendor:igssmodel: - scope:eqversion:3.0

Trust: 0.2

vendor:igssmodel: - scope:eqversion:4.1

Trust: 0.2

vendor:igssmodel: - scope:eqversion:5.0

Trust: 0.2

vendor:igssmodel: - scope:eqversion:5.1

Trust: 0.2

vendor:igssmodel: - scope:eqversion:6

Trust: 0.2

vendor:igssmodel: - scope:eqversion:7

Trust: 0.2

vendor:igssmodel: - scope:eqversion:8

Trust: 0.2

vendor:igssmodel: - scope:eqversion:9

Trust: 0.2

vendor:igssmodel: - scope:eqversion:9.0.0.11129

Trust: 0.2

vendor:igssmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 33632ae4-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-0177 // BID: 51438 // JVNDB: JVNDB-2012-001111 // CNNVD: CNNVD-201201-197 // NVD: CVE-2011-4053

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-4053
value: HIGH

Trust: 1.0

NVD: CVE-2011-4053
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201201-197
value: CRITICAL

Trust: 0.6

IVD: 33632ae4-2354-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2011-4053
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 33632ae4-2354-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 33632ae4-2354-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2012-001111 // CNNVD: CNNVD-201201-197 // NVD: CVE-2011-4053

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2012-001111 // NVD: CVE-2011-4053

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201201-197

TYPE

other

Trust: 0.8

sources: IVD: 33632ae4-2354-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201201-197

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001111

PATCH

title:Top Pageurl:http://www.igss.com/index.htm\

Trust: 0.8

title:7-Technologies Interactive Graphical SCADA System Unsafe Library Loading Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/7631

Trust: 0.6

sources: CNVD: CNVD-2012-0177 // JVNDB: JVNDB-2012-001111

EXTERNAL IDS

db:NVDid:CVE-2011-4053

Trust: 3.5

db:ICS CERTid:ICSA-11-353-01

Trust: 2.8

db:SECUNIAid:47558

Trust: 1.4

db:CNVDid:CNVD-2012-0177

Trust: 0.8

db:CNNVDid:CNNVD-201201-197

Trust: 0.8

db:JVNDBid:JVNDB-2012-001111

Trust: 0.8

db:BIDid:51438

Trust: 0.3

db:IVDid:33632AE4-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:108779

Trust: 0.1

sources: IVD: 33632ae4-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-0177 // BID: 51438 // JVNDB: JVNDB-2012-001111 // PACKETSTORM: 108779 // CNNVD: CNNVD-201201-197 // NVD: CVE-2011-4053

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-11-353-01.pdf

Trust: 2.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4053

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4053

Trust: 0.8

url:http://secunia.com/advisories/47558/http

Trust: 0.6

url:http://secunia.com/advisories/47558

Trust: 0.6

url:http://www.igss.com/index.htm

Trust: 0.3

url:http://blog.rapid7.com/?p=5325

Trust: 0.3

url:http://blog.metasploit.com/2010/08/exploiting-dll-hijacking-flaws.html

Trust: 0.3

url:http://blogs.technet.com/b/srd/archive/2010/08/23/more-information-about-dll-preloading-remote-attack-vector.aspx

Trust: 0.3

url:http://secunia.com/advisories/47558/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47558

Trust: 0.1

url:http://secunia.com/company/jobs/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/47558/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-0177 // BID: 51438 // JVNDB: JVNDB-2012-001111 // PACKETSTORM: 108779 // CNNVD: CNNVD-201201-197 // NVD: CVE-2011-4053

CREDITS

Kuang-Chun Hung

Trust: 0.3

sources: BID: 51438

SOURCES

db:IVDid:33632ae4-2354-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-0177
db:BIDid:51438
db:JVNDBid:JVNDB-2012-001111
db:PACKETSTORMid:108779
db:CNNVDid:CNNVD-201201-197
db:NVDid:CVE-2011-4053

LAST UPDATE DATE

2025-04-11T22:49:49.526000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-0177date:2012-01-19T00:00:00
db:BIDid:51438date:2012-01-16T00:00:00
db:JVNDBid:JVNDB-2012-001111date:2012-01-20T00:00:00
db:CNNVDid:CNNVD-201201-197date:2012-01-20T00:00:00
db:NVDid:CVE-2011-4053date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:33632ae4-2354-11e6-abef-000c29c66e3ddate:2012-01-19T00:00:00
db:CNVDid:CNVD-2012-0177date:2012-01-19T00:00:00
db:BIDid:51438date:2012-01-16T00:00:00
db:JVNDBid:JVNDB-2012-001111date:2012-01-20T00:00:00
db:PACKETSTORMid:108779date:2012-01-18T08:00:19
db:CNNVDid:CNNVD-201201-197date:2012-01-20T00:00:00
db:NVDid:CVE-2011-4053date:2012-01-19T15:55:00.757