ID

VAR-201505-0077


CVE

CVE-2015-0986


TITLE

Moxa VPort ActiveX SDK Plus Vulnerable to stack-based buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2015-002814

DESCRIPTION

Multiple stack-based buffer overflows in Moxa VPort ActiveX SDK Plus before 2.8 allow remote attackers to insert assembly-code lines via vectors involving a regkey (1) set or (2) get command. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the VPORTSDK.VPortSDKCtrl.1 ActiveX control. By passing an overly long string to the GetClientReg method's Name parameter, an attacker can overflow a buffer on the stack. This vulnerability could be used to execute arbitrary code in the context of the browser. Moxa's VPort SDK PLUS, including CGI command, ActiveX control and API libraries, allows third-party developers to easily integrate custom monitoring applications. Multiple Moxa products are prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Failed exploit attempts will likely result in denial-of-service conditions. The tool supports VB, VC and C# development environments, etc

Trust: 3.24

sources: NVD: CVE-2015-0986 // JVNDB: JVNDB-2015-002814 // ZDI: ZDI-15-392 // CNVD: CNVD-2015-03476 // BID: 73960 // VULHUB: VHN-78932 // VULMON: CVE-2015-0986

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-03476

AFFECTED PRODUCTS

vendor:moxamodel:vport activex sdk plusscope:eqversion:2.7

Trust: 1.2

vendor:moxamodel:vport activex sdk plusscope:lteversion:2.7

Trust: 1.0

vendor:moxamodel:vport activex sdk plusscope:ltversion:2.8

Trust: 0.8

vendor:moxamodel:vport activex sdk plusscope: - version: -

Trust: 0.7

vendor:moxamodel:vport p16-1mp-m12-irscope:eqversion:2.7

Trust: 0.3

vendor:moxamodel:vport p16-1mp-m12scope:eqversion:2.7

Trust: 0.3

vendor:moxamodel:vport p06hc-1mp-m12scope:eqversion:2.7

Trust: 0.3

vendor:moxamodel:vport p06-1mp-m12scope:eqversion:2.7

Trust: 0.3

vendor:moxamodel:vport 56-2mpscope:eqversion:2.7

Trust: 0.3

vendor:moxamodel:vportscope:eqversion:4612.7

Trust: 0.3

vendor:moxamodel:vportscope:eqversion:4512.7

Trust: 0.3

vendor:moxamodel:vport 364ascope:eqversion:2.7

Trust: 0.3

vendor:moxamodel:vport 36-1mpscope:eqversion:2.7

Trust: 0.3

vendor:moxamodel:vportscope:eqversion:3542.7

Trust: 0.3

vendor:moxamodel:vportscope:eqversion:3512.7

Trust: 0.3

vendor:moxamodel:vport 26a-1mpscope:eqversion:2.7

Trust: 0.3

vendor:moxamodel:mxnvr-mo4scope:eqversion:2.7

Trust: 0.3

vendor:moxamodel:vport p16-1mp-m12-irscope:neversion:2.8

Trust: 0.3

vendor:moxamodel:vport p16-1mp-m12scope:neversion:2.8

Trust: 0.3

vendor:moxamodel:vport p06hc-1mp-m12scope:neversion:2.8

Trust: 0.3

vendor:moxamodel:vport p06-1mp-m12scope:neversion:2.8

Trust: 0.3

vendor:moxamodel:vport 56-2mpscope:neversion:2.8

Trust: 0.3

vendor:moxamodel:vportscope:neversion:4612.8

Trust: 0.3

vendor:moxamodel:vportscope:neversion:4512.8

Trust: 0.3

vendor:moxamodel:vport 364ascope:neversion:2.8

Trust: 0.3

vendor:moxamodel:vport 36-1mpscope:neversion:2.8

Trust: 0.3

vendor:moxamodel:vportscope:neversion:3542.8

Trust: 0.3

vendor:moxamodel:vportscope:neversion:3512.8

Trust: 0.3

vendor:moxamodel:vport 26a-1mpscope:neversion:2.8

Trust: 0.3

vendor:moxamodel:mxnvr-mo4scope:neversion:2.8

Trust: 0.3

sources: ZDI: ZDI-15-392 // CNVD: CNVD-2015-03476 // BID: 73960 // JVNDB: JVNDB-2015-002814 // CNNVD: CNNVD-201505-546 // NVD: CVE-2015-0986

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0986
value: HIGH

Trust: 1.0

NVD: CVE-2015-0986
value: HIGH

Trust: 0.8

ZDI: CVE-2015-0986
value: HIGH

Trust: 0.7

CNVD: CNVD-2015-03476
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201505-546
value: HIGH

Trust: 0.6

VULHUB: VHN-78932
value: HIGH

Trust: 0.1

VULMON: CVE-2015-0986
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0986
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.6

CNVD: CNVD-2015-03476
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78932
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-15-392 // CNVD: CNVD-2015-03476 // VULHUB: VHN-78932 // VULMON: CVE-2015-0986 // JVNDB: JVNDB-2015-002814 // CNNVD: CNNVD-201505-546 // NVD: CVE-2015-0986

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-78932 // JVNDB: JVNDB-2015-002814 // NVD: CVE-2015-0986

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201505-546

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201505-546

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002814

PATCH

title:VPort ActiveX SDK PLUSurl:http://www.moxa.com/support/download.aspx?d_id=2114

Trust: 0.8

title:Moxa has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-15-097-01

Trust: 0.7

title:Patch for Moxa VPort ActiveX SDK Plus Stack Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/59041

Trust: 0.6

title:SDK_VPortSDKPlusActiveX_v2.8_Build_15030913url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=55924

Trust: 0.6

sources: ZDI: ZDI-15-392 // CNVD: CNVD-2015-03476 // JVNDB: JVNDB-2015-002814 // CNNVD: CNNVD-201505-546

EXTERNAL IDS

db:NVDid:CVE-2015-0986

Trust: 4.2

db:ICS CERTid:ICSA-15-097-01

Trust: 3.2

db:ZDIid:ZDI-15-392

Trust: 1.9

db:BIDid:73960

Trust: 1.5

db:JVNDBid:JVNDB-2015-002814

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2525

Trust: 0.7

db:CNNVDid:CNNVD-201505-546

Trust: 0.7

db:CNVDid:CNVD-2015-03476

Trust: 0.6

db:VULHUBid:VHN-78932

Trust: 0.1

db:VULMONid:CVE-2015-0986

Trust: 0.1

sources: ZDI: ZDI-15-392 // CNVD: CNVD-2015-03476 // VULHUB: VHN-78932 // VULMON: CVE-2015-0986 // BID: 73960 // JVNDB: JVNDB-2015-002814 // CNNVD: CNNVD-201505-546 // NVD: CVE-2015-0986

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-15-097-01

Trust: 4.0

url:http://www.moxa.com/support/download.aspx?d_id=2114

Trust: 1.8

url:http://www.securityfocus.com/bid/73960

Trust: 1.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-392

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0986

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0986

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/windows-hotfix-ms16-036

Trust: 0.1

sources: ZDI: ZDI-15-392 // CNVD: CNVD-2015-03476 // VULHUB: VHN-78932 // VULMON: CVE-2015-0986 // JVNDB: JVNDB-2015-002814 // CNNVD: CNNVD-201505-546 // NVD: CVE-2015-0986

CREDITS

Ariele Caltabiano (kimiya)

Trust: 0.7

sources: ZDI: ZDI-15-392

SOURCES

db:ZDIid:ZDI-15-392
db:CNVDid:CNVD-2015-03476
db:VULHUBid:VHN-78932
db:VULMONid:CVE-2015-0986
db:BIDid:73960
db:JVNDBid:JVNDB-2015-002814
db:CNNVDid:CNNVD-201505-546
db:NVDid:CVE-2015-0986

LAST UPDATE DATE

2025-04-13T23:39:06.841000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-15-392date:2015-08-13T00:00:00
db:CNVDid:CNVD-2015-03476date:2015-05-29T00:00:00
db:VULHUBid:VHN-78932date:2016-12-08T00:00:00
db:VULMONid:CVE-2015-0986date:2016-12-08T00:00:00
db:BIDid:73960date:2015-11-03T19:03:00
db:JVNDBid:JVNDB-2015-002814date:2015-05-28T00:00:00
db:CNNVDid:CNNVD-201505-546date:2015-05-27T00:00:00
db:NVDid:CVE-2015-0986date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:ZDIid:ZDI-15-392date:2015-08-13T00:00:00
db:CNVDid:CNVD-2015-03476date:2015-05-29T00:00:00
db:VULHUBid:VHN-78932date:2015-05-26T00:00:00
db:VULMONid:CVE-2015-0986date:2015-05-26T00:00:00
db:BIDid:73960date:2015-04-08T00:00:00
db:JVNDBid:JVNDB-2015-002814date:2015-05-28T00:00:00
db:CNNVDid:CNNVD-201505-546date:2015-05-27T00:00:00
db:NVDid:CVE-2015-0986date:2015-05-26T15:59:00.073