ID

VAR-201204-0163


CVE

CVE-2012-0257


TITLE

plural Invensys Heap-based buffer overflow vulnerability in products

Trust: 0.8

sources: JVNDB: JVNDB-2012-001987

DESCRIPTION

Heap-based buffer overflow in the WWCabFile ActiveX component in the Wonderware System Platform in Invensys Wonderware Application Server 2012 and earlier, Foxboro Control Software 3.1 and earlier, InFusion CE/FE/SCADA 2.5 and earlier, Wonderware Information Server 4.5 and earlier, ArchestrA Application Object Toolkit 3.2 and earlier, and InTouch 10.0 through 10.5 might allow remote attackers to execute arbitrary code via a long string to the Open member, leading to a function-pointer overwrite. Invensys is a leading provider of automation and information technology, systems, software solutions, services and consulting for the manufacturing and infrastructure industries. Invensys WWCabFile AciveX component has a heap-based buffer overflow. Multiple Invensys products are prone to multiple heap-based buffer-overflow vulnerabilities. Attackers may exploit these issues to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Invensys Products ActiveX Control Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA48675 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48675/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48675 RELEASE DATE: 2012-04-02 DISCUSS ADVISORY: http://secunia.com/advisories/48675/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48675/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48675 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Two vulnerabilities have been reported in Invensys products, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. * Invensys Wonderware InTouch versions 10.0 through 10.5. SOLUTION: Install patch. Please see the vendor's advisory for more information. PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Celil Unuver, SignalSec Corporation. ORIGINAL ADVISORY: ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf Wonderware (requires login): https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000071.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2012-0257 // JVNDB: JVNDB-2012-001987 // CNVD: CNVD-2012-1690 // BID: 52835 // IVD: f9b5871a-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-53538 // PACKETSTORM: 111462

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: f9b5871a-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1690

AFFECTED PRODUCTS

vendor:invensysmodel:intouchscope:eqversion:10.0

Trust: 2.5

vendor:invensysmodel:intouchscope:eqversion:10.5

Trust: 2.5

vendor:invensysmodel:archestra application object toolkitscope:lteversion:3.2

Trust: 1.8

vendor:invensysmodel:foxboro control softwarescope:lteversion:3.1

Trust: 1.8

vendor:invensysmodel:infusion control editionscope:lteversion:2.5

Trust: 1.8

vendor:invensysmodel:infusion foundation editionscope:lteversion:2.5

Trust: 1.8

vendor:invensysmodel:infusion scadascope:lteversion:2.5

Trust: 1.8

vendor:invensysmodel:wonderware application serverscope:lteversion:2012

Trust: 1.8

vendor:invensysmodel:wonderware information serverscope:lteversion:4.5

Trust: 1.8

vendor:invensysmodel:wonderware information serverscope:eqversion:4.0

Trust: 1.6

vendor:invensysmodel:wonderware information serverscope:eqversion:4.5

Trust: 1.5

vendor:invensysmodel:foxboro control softwarescope:eqversion:3.1

Trust: 1.5

vendor:invensysmodel:archestra application object toolkitscope:eqversion:3.2

Trust: 1.5

vendor:invensysmodel:wonderware information serverscope:eqversion:3.1

Trust: 1.0

vendor:invensysmodel:wonderware application serverscope:eqversion:20120

Trust: 0.9

vendor:invensysmodel:infusion ce/fe/scadascope:eqversion:2.5

Trust: 0.9

vendor:invensysmodel:intouchscope:eqversion:10.0 to 10.5

Trust: 0.8

vendor:invensysmodel:wonderware application serverscope:eqversion:2012

Trust: 0.6

vendor:invensysmodel:infusion control editionscope:eqversion:2.5

Trust: 0.6

vendor:invensysmodel:infusion scadascope:eqversion:2.5

Trust: 0.6

vendor:invensysmodel:infusion foundation editionscope:eqversion:2.5

Trust: 0.6

vendor:wonderware information servermodel: - scope:eqversion:4.0

Trust: 0.4

vendor:archestra application object toolkitmodel: - scope:eqversion:*

Trust: 0.2

vendor:foxboro controlmodel: - scope:eqversion:*

Trust: 0.2

vendor:infusion control editionmodel: - scope:eqversion:*

Trust: 0.2

vendor:infusion editionmodel: - scope:eqversion:*

Trust: 0.2

vendor:infusion scadamodel: - scope:eqversion:*

Trust: 0.2

vendor:intouchmodel: - scope:eqversion:10.0

Trust: 0.2

vendor:intouchmodel: - scope:eqversion:10.5

Trust: 0.2

vendor:wonderware application servermodel: - scope:eqversion:*

Trust: 0.2

vendor:wonderware information servermodel: - scope:eqversion:3.1

Trust: 0.2

vendor:wonderware information servermodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: f9b5871a-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1690 // BID: 52835 // JVNDB: JVNDB-2012-001987 // CNNVD: CNNVD-201203-596 // NVD: CVE-2012-0257

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0257
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-0257
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201203-596
value: MEDIUM

Trust: 0.6

IVD: f9b5871a-2353-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-53538
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-0257
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: f9b5871a-2353-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-53538
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: f9b5871a-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-53538 // JVNDB: JVNDB-2012-001987 // CNNVD: CNNVD-201203-596 // NVD: CVE-2012-0257

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-53538 // JVNDB: JVNDB-2012-001987 // NVD: CVE-2012-0257

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201203-596

TYPE

Buffer overflow

Trust: 0.8

sources: IVD: f9b5871a-2353-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201203-596

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001987

PATCH

title:Top Pageurl:http://global.wonderware.com/EN/Pages/default.aspx

Trust: 0.8

title:ハードウェア・パートナーurl:http://iom.invensys.com/JP/Pages/IOM_HardwarePartners.aspx

Trust: 0.8

title:ソフトウェア・パートナーurl:http://iom.invensys.com/JP/Pages/IOM_SoftwarePartners.aspx

Trust: 0.8

title:Wonderware 日本のパートナーurl:http://global.wonderware.com/JP/Pages/JpPartnersSI.aspx

Trust: 0.8

title:Wonderware Top Pageurl:http://iom.invensys.com/JP/Pages/home.aspx

Trust: 0.8

title:Patch for Multiple Invensys Products Remote Heap Buffer Overflow Vulnerability (CNVD-2012-1690)url:https://www.cnvd.org.cn/patchInfo/show/15178

Trust: 0.6

sources: CNVD: CNVD-2012-1690 // JVNDB: JVNDB-2012-001987

EXTERNAL IDS

db:NVDid:CVE-2012-0257

Trust: 3.6

db:ICS CERTid:ICSA-12-081-01

Trust: 3.5

db:SECUNIAid:48675

Trust: 1.9

db:OSVDBid:80891

Trust: 1.1

db:CNNVDid:CNNVD-201203-596

Trust: 0.9

db:BIDid:52835

Trust: 0.9

db:CNVDid:CNVD-2012-1690

Trust: 0.8

db:JVNDBid:JVNDB-2012-001987

Trust: 0.8

db:IVDid:F9B5871A-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-53538

Trust: 0.1

db:PACKETSTORMid:111462

Trust: 0.1

sources: IVD: f9b5871a-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1690 // VULHUB: VHN-53538 // BID: 52835 // JVNDB: JVNDB-2012-001987 // PACKETSTORM: 111462 // CNNVD: CNNVD-201203-596 // NVD: CVE-2012-0257

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-081-01.pdf

Trust: 3.5

url:https://wdnresource.wonderware.com/support/docs/_securitybulletins/security_bulletin_lfsec00000071.pdf

Trust: 1.8

url:http://secunia.com/advisories/48675

Trust: 1.7

url:http://osvdb.org/80891

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0257

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0257

Trust: 0.8

url:http://www.securityfocus.com/bid/52835

Trust: 0.6

url:http://global.wonderware.com/en/pages/default.aspx

Trust: 0.3

url:http://secunia.com/advisories/48675/

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/advisories/48675/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48675

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-1690 // VULHUB: VHN-53538 // BID: 52835 // JVNDB: JVNDB-2012-001987 // PACKETSTORM: 111462 // CNNVD: CNNVD-201203-596 // NVD: CVE-2012-0257

CREDITS

Celil Unuver of SignalSec Corporation

Trust: 0.9

sources: BID: 52835 // CNNVD: CNNVD-201203-596

SOURCES

db:IVDid:f9b5871a-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-1690
db:VULHUBid:VHN-53538
db:BIDid:52835
db:JVNDBid:JVNDB-2012-001987
db:PACKETSTORMid:111462
db:CNNVDid:CNNVD-201203-596
db:NVDid:CVE-2012-0257

LAST UPDATE DATE

2025-04-11T23:07:25.482000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-1690date:2012-04-01T00:00:00
db:VULHUBid:VHN-53538date:2013-03-26T00:00:00
db:BIDid:52835date:2012-03-30T00:00:00
db:JVNDBid:JVNDB-2012-001987date:2012-04-04T00:00:00
db:CNNVDid:CNNVD-201203-596date:2012-04-01T00:00:00
db:NVDid:CVE-2012-0257date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:f9b5871a-2353-11e6-abef-000c29c66e3ddate:2012-04-01T00:00:00
db:CNVDid:CNVD-2012-1690date:2012-04-01T00:00:00
db:VULHUBid:VHN-53538date:2012-04-02T00:00:00
db:BIDid:52835date:2012-03-30T00:00:00
db:JVNDBid:JVNDB-2012-001987date:2012-04-04T00:00:00
db:PACKETSTORMid:111462date:2012-04-02T05:26:16
db:CNNVDid:CNNVD-201203-596date:2012-03-30T00:00:00
db:NVDid:CVE-2012-0257date:2012-04-02T20:55:02.187