ID

VAR-201203-0278


CVE

CVE-2012-0229


TITLE

GE Intelligent Platforms Proficy Historian Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-001802

DESCRIPTION

The Data Archiver service in GE Intelligent Platforms Proficy Historian 4.5 and earlier allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted session on TCP port 14000 to (1) ihDataArchiver.exe or (2) ihDataArchiver_x64.exe. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GE iFix. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ihDataArchiver.exe process which listens by default on TCP port 14000. Several errors are present in the code responsible for parsing data from the network. GE Proficy Historian is a factory system that collects, archives and distributes very large amounts of real-time data at high speed. Failed exploit attempts will likely result in denial-of-service conditions. - -- Vendor Response: GE has issued an update to correct this vulnerability. More details can be found at: http://support.ge-ip.com/support/index?page=kbchannel&id=S:KB14767 - -- Disclosure Timeline: 2011-10-17 - Vulnerability reported to vendor 2012-08-03 - Coordinated public release of advisory - -- Credit: This vulnerability was discovered by: * Luigi Auriemma - -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ Follow the ZDI on Twitter: http://twitter.com/thezdi -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) Charset: utf-8 wsBVAwUBUBwr11VtgMGTo1scAQLJgQf/ch8WS423yg6HqmDf02bbhylP979o5mVq k6XN4d0u0bl6oa74wadnd0ch1iZE70b9icervXe2IEdaZEQenQ9nOYBGdXg+/Sr7 V5qOvm+gOUT3kta9ogW8RLO5gZnMjA0MnY68laphjuTFqVaz0w24D+NjrxflR0IL WT0s2ct0S6L5MvVYQWYse/dLqr3KGuY1YaTkDfALwjXXDRv9UYf+4QMgDD2Jw0+f qRqlTUhe8iEdju/mstYLNsZ6g4plUFvs9piBmZG82K5NsxZjyX8GHuWv48siQbUP hlreFBPJ89cvqVX9ap+5AlioJkWPg8bGuK80jpStIJFYjy6aY4u13Q== =L3hq -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Proficy Historian Data Archiver Service Memory Corruption Vulnerability SECUNIA ADVISORY ID: SA48369 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48369/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48369 RELEASE DATE: 2012-03-14 DISCUSS ADVISORY: http://secunia.com/advisories/48369/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48369/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48369 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Proficy Historian, which can be exploited by malicious people to compromise a vulnerable system. This can be exploited to corrupt memory via a specially crafted packet sent to TCP port 14000. Successful exploitation may allow execution of arbitrary code. The vulnerability is reported in the following products: * Proficy Historian versions 4.5 and prior. * Proficy HMI/SCADA \x96 CIMPLICITY version 8.2. * Proficy HMI/SCADA \x96 iFIX versions 5.0, 5.1, and 5.5. SOLUTION: Apply patches (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: The vendor credits Luigi Auriemma via ZDI. ORIGINAL ADVISORY: GE: http://support.ge-ip.com/support/resources/sites/GE_FANUC_SUPPORT/content/live/KB/14000/KB14767/en_US/GEIP12-01%20Security%20Advisory%20-%20Proficy%20Historian%20ihDataArchiver.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.51

sources: NVD: CVE-2012-0229 // JVNDB: JVNDB-2012-001802 // ZDI: ZDI-12-133 // CNVD: CNVD-2012-1304 // BID: 52437 // IVD: 04a7da74-2354-11e6-abef-000c29c66e3d // VULMON: CVE-2012-0229 // PACKETSTORM: 115259 // PACKETSTORM: 110810

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 04a7da74-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1304

AFFECTED PRODUCTS

vendor:gemodel:intelligent platforms proficy historianscope:eqversion:4.0

Trust: 1.6

vendor:gemodel:intelligent platforms proficy historianscope:eqversion:2.0

Trust: 1.6

vendor:gemodel:intelligent platforms proficy historianscope:eqversion:3.0

Trust: 1.6

vendor:gemodel:intelligent platforms proficy historianscope:eqversion:3.5

Trust: 1.6

vendor:gemodel:intelligent platforms proficy historianscope:eqversion:3.1

Trust: 1.6

vendor:gemodel:intelligent platforms proficy historianscope:eqversion:1.0

Trust: 1.6

vendor:gemodel:intelligent platforms proficy historianscope:lteversion:4.5

Trust: 1.0

vendor:generalmodel:electric proficy hmi/scada-ifixscope:eqversion:5.5

Trust: 0.9

vendor:generalmodel:electric proficy historianscope:eqversion:3.1

Trust: 0.9

vendor:generalmodel:electric proficy historianscope:eqversion:4.5

Trust: 0.9

vendor:general electricmodel:proficy historianscope:lteversion:4.5

Trust: 0.8

vendor:gemodel:proficy historian ihdataarchiverscope: - version: -

Trust: 0.7

vendor:general electricmodel:proficy hmi/scada-ifixscope:eqversion:5.0

Trust: 0.6

vendor:general electricmodel:proficy hmi/scada-ifixscope:eqversion:5.1

Trust: 0.6

vendor:general electricmodel:proficy hmi/scada-cimplicityscope:eqversion:8.2

Trust: 0.6

vendor:general electricmodel:proficy hmi/scada-cimplicityscope:eqversion:8.1

Trust: 0.6

vendor:general electricmodel:proficy historianscope:eqversion:3.5

Trust: 0.6

vendor:general electricmodel:proficy historianscope:eqversion:4.0

Trust: 0.6

vendor:gemodel:intelligent platforms proficy historianscope:eqversion:4.5

Trust: 0.6

vendor:intelligent platforms proficy historianmodel: - scope:eqversion:2.0

Trust: 0.4

vendor:generalmodel:electric proficy hmi/scada-ifixscope:eqversion:5.1

Trust: 0.3

vendor:generalmodel:electric proficy hmi/scada-ifixscope:eqversion:5.0

Trust: 0.3

vendor:generalmodel:electric proficy hmi/scada-cimplicityscope:eqversion:8.2

Trust: 0.3

vendor:generalmodel:electric proficy hmi/scada-cimplicityscope:eqversion:8.1

Trust: 0.3

vendor:generalmodel:electric proficy historianscope:eqversion:4.0

Trust: 0.3

vendor:generalmodel:electric proficy historianscope:eqversion:3.5

Trust: 0.3

vendor:generalmodel:electric proficy historianscope:eqversion:0

Trust: 0.3

vendor:intelligent platforms proficy historianmodel: - scope:eqversion:1.0

Trust: 0.2

vendor:intelligent platforms proficy historianmodel: - scope:eqversion:3.0

Trust: 0.2

vendor:intelligent platforms proficy historianmodel: - scope:eqversion:3.1

Trust: 0.2

vendor:intelligent platforms proficy historianmodel: - scope:eqversion:3.5

Trust: 0.2

vendor:intelligent platforms proficy historianmodel: - scope:eqversion:4.0

Trust: 0.2

vendor:intelligent platforms proficy historianmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 04a7da74-2354-11e6-abef-000c29c66e3d // ZDI: ZDI-12-133 // CNVD: CNVD-2012-1304 // BID: 52437 // JVNDB: JVNDB-2012-001802 // CNNVD: CNNVD-201203-261 // NVD: CVE-2012-0229

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0229
value: HIGH

Trust: 1.0

NVD: CVE-2012-0229
value: HIGH

Trust: 0.8

ZDI: CVE-2012-0229
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201203-261
value: CRITICAL

Trust: 0.6

IVD: 04a7da74-2354-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

VULMON: CVE-2012-0229
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-0229
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.6

IVD: 04a7da74-2354-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 04a7da74-2354-11e6-abef-000c29c66e3d // ZDI: ZDI-12-133 // VULMON: CVE-2012-0229 // JVNDB: JVNDB-2012-001802 // CNNVD: CNNVD-201203-261 // NVD: CVE-2012-0229

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2012-001802 // NVD: CVE-2012-0229

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 115259 // CNNVD: CNNVD-201203-261

TYPE

Buffer overflow

Trust: 0.8

sources: IVD: 04a7da74-2354-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201203-261

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001802

PATCH

title:GEIP12-01url:http://support.ge-ip.com/support/index?page=kbchannel&id=S:KB14767

Trust: 1.5

title:Top Pageurl:http://www.ge-ip.com/

Trust: 0.8

title:partnerurl:http://www.ge-ip.co.jp/partner.html

Trust: 0.8

title:Top Pageurl:http://www.ge-ip.co.jp/

Trust: 0.8

title:Patch for GE Proficy Historian Data Archive Service Remote Memory Corruption Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/13371

Trust: 0.6

sources: ZDI: ZDI-12-133 // CNVD: CNVD-2012-1304 // JVNDB: JVNDB-2012-001802

EXTERNAL IDS

db:NVDid:CVE-2012-0229

Trust: 4.4

db:ICS CERTid:ICSA-12-032-01

Trust: 3.4

db:BIDid:52437

Trust: 2.0

db:SECUNIAid:48369

Trust: 1.2

db:ZDIid:ZDI-12-133

Trust: 1.1

db:CNVDid:CNVD-2012-1304

Trust: 0.8

db:CNNVDid:CNNVD-201203-261

Trust: 0.8

db:JVNDBid:JVNDB-2012-001802

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-1377

Trust: 0.7

db:NSFOCUSid:19059

Trust: 0.6

db:IVDid:04A7DA74-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULMONid:CVE-2012-0229

Trust: 0.1

db:PACKETSTORMid:115259

Trust: 0.1

db:PACKETSTORMid:110810

Trust: 0.1

sources: IVD: 04a7da74-2354-11e6-abef-000c29c66e3d // ZDI: ZDI-12-133 // CNVD: CNVD-2012-1304 // VULMON: CVE-2012-0229 // BID: 52437 // JVNDB: JVNDB-2012-001802 // PACKETSTORM: 115259 // PACKETSTORM: 110810 // CNNVD: CNNVD-201203-261 // NVD: CVE-2012-0229

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-032-01.pdf

Trust: 3.4

url:http://support.ge-ip.com/support/index?page=kbchannel&id=s:kb14767

Trust: 2.5

url:http://www.securityfocus.com/bid/52437

Trust: 1.8

url:http://secunia.com/advisories/48369

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0229

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0229

Trust: 0.8

url:http://www.nsfocus.net/vulndb/19059

Trust: 0.6

url:http://www.ge-ip.com/products/2420

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-12-133/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://ics-cert.us-cert.gov/advisories/icsa-12-032-01

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0229

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-12-133

Trust: 0.1

url:http://twitter.com/thezdi

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://support.ge-ip.com/support/resources/sites/ge_fanuc_support/content/live/kb/14000/kb14767/en_us/geip12-01%20security%20advisory%20-%20proficy%20historian%20ihdataarchiver.pdf

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48369

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/48369/#comments

Trust: 0.1

url:http://secunia.com/advisories/48369/

Trust: 0.1

sources: ZDI: ZDI-12-133 // CNVD: CNVD-2012-1304 // VULMON: CVE-2012-0229 // BID: 52437 // JVNDB: JVNDB-2012-001802 // PACKETSTORM: 115259 // PACKETSTORM: 110810 // CNNVD: CNNVD-201203-261 // NVD: CVE-2012-0229

CREDITS

GE and Zero Day Initiative.

Trust: 0.9

sources: BID: 52437 // CNNVD: CNNVD-201203-261

SOURCES

db:IVDid:04a7da74-2354-11e6-abef-000c29c66e3d
db:ZDIid:ZDI-12-133
db:CNVDid:CNVD-2012-1304
db:VULMONid:CVE-2012-0229
db:BIDid:52437
db:JVNDBid:JVNDB-2012-001802
db:PACKETSTORMid:115259
db:PACKETSTORMid:110810
db:CNNVDid:CNNVD-201203-261
db:NVDid:CVE-2012-0229

LAST UPDATE DATE

2025-04-11T23:15:34.694000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-12-133date:2012-08-03T00:00:00
db:CNVDid:CNVD-2012-1304date:2012-03-15T00:00:00
db:VULMONid:CVE-2012-0229date:2018-01-04T00:00:00
db:BIDid:52437date:2015-03-19T09:48:00
db:JVNDBid:JVNDB-2012-001802date:2012-03-19T00:00:00
db:CNNVDid:CNNVD-201203-261date:2012-03-15T00:00:00
db:NVDid:CVE-2012-0229date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:04a7da74-2354-11e6-abef-000c29c66e3ddate:2012-03-15T00:00:00
db:ZDIid:ZDI-12-133date:2012-08-03T00:00:00
db:CNVDid:CNVD-2012-1304date:2012-03-15T00:00:00
db:VULMONid:CVE-2012-0229date:2012-03-15T00:00:00
db:BIDid:52437date:2012-03-13T00:00:00
db:JVNDBid:JVNDB-2012-001802date:2012-03-19T00:00:00
db:PACKETSTORMid:115259date:2012-08-03T22:36:48
db:PACKETSTORMid:110810date:2012-03-14T06:42:50
db:CNNVDid:CNNVD-201203-261date:2012-03-15T00:00:00
db:NVDid:CVE-2012-0229date:2012-03-15T18:55:00.727