ID

VAR-201512-0015


CVE

CVE-2015-7918


TITLE

Schneider Electric ProClima ActiveX Control Code injection vulnerability

Trust: 0.8

sources: IVD: 6d683610-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-07899

DESCRIPTION

Multiple buffer overflows in the F1BookView ActiveX control in F1 Bookview in Schneider Electric ProClima before 6.2 allow remote attackers to execute arbitrary code via the (1) Attach, (2) DefinedName, (3) DefinedNameLocal, (4) ODBCPrepareEx, (5) ObjCreatePolygon, (6) SetTabbedTextEx, or (7) SetValidationRule method, a different vulnerability than CVE-2015-8561. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the implementation of the DefinedName method. Memory corruption occurs when a long user-supplied name is supplied. Later in processing, the code jumps to an address outside of normal flow. An attacker may be able to leverage this flaw to execute code under the context of the process. A buffer overrun occurs when a long string is passed by the user to the method. Schneider Electric ProClima is a thermal calculation software from Schneider Electric, France. Failed exploit attempts will likely cause a denial-of-service condition. The affected ActiveX control is identified by CLSID: 3D6F2DBA-F4E5-40A6-8725-E99BC96CC23A

Trust: 7.11

sources: NVD: CVE-2015-7918 // JVNDB: JVNDB-2015-006424 // ZDI: ZDI-15-635 // ZDI: ZDI-15-634 // ZDI: ZDI-15-632 // ZDI: ZDI-15-630 // ZDI: ZDI-15-625 // ZDI: ZDI-15-633 // ZDI: ZDI-15-631 // CNVD: CNVD-2015-07899 // BID: 78421 // IVD: 6d683610-2351-11e6-abef-000c29c66e3d // VULHUB: VHN-85879

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 6d683610-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-07899

AFFECTED PRODUCTS

vendor:schneider electricmodel:proclimascope: - version: -

Trust: 4.9

vendor:schneider electricmodel:proclimascope:lteversion:6.1

Trust: 1.0

vendor:schneider electricmodel:proclimascope:eqversion:6.1

Trust: 0.9

vendor:schneider electricmodel:proclimascope:ltversion:6.2

Trust: 0.8

vendor:schneidermodel:electric proclimascope:ltversion:6.1

Trust: 0.6

vendor:schneider electricmodel:proclimascope:eqversion:6.0.1

Trust: 0.3

vendor:schneider electricmodel:proclimascope:eqversion:6.0

Trust: 0.3

vendor:schneider electricmodel:proclimascope:neversion:6.2

Trust: 0.3

vendor:proclimamodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 6d683610-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-15-635 // ZDI: ZDI-15-634 // ZDI: ZDI-15-632 // ZDI: ZDI-15-630 // ZDI: ZDI-15-625 // ZDI: ZDI-15-633 // ZDI: ZDI-15-631 // CNVD: CNVD-2015-07899 // BID: 78421 // JVNDB: JVNDB-2015-006424 // CNNVD: CNNVD-201512-005 // NVD: CVE-2015-7918

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2015-7918
value: MEDIUM

Trust: 4.9

nvd@nist.gov: CVE-2015-7918
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-7918
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-07899
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201512-005
value: MEDIUM

Trust: 0.6

IVD: 6d683610-2351-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-85879
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-7918
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 6.7

CNVD: CNVD-2015-07899
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 6d683610-2351-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-85879
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 6d683610-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-15-635 // ZDI: ZDI-15-634 // ZDI: ZDI-15-632 // ZDI: ZDI-15-630 // ZDI: ZDI-15-625 // ZDI: ZDI-15-633 // ZDI: ZDI-15-631 // CNVD: CNVD-2015-07899 // VULHUB: VHN-85879 // JVNDB: JVNDB-2015-006424 // CNNVD: CNNVD-201512-005 // NVD: CVE-2015-7918

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-85879 // JVNDB: JVNDB-2015-006424 // NVD: CVE-2015-7918

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201512-005

TYPE

Buffer overflow

Trust: 0.8

sources: IVD: 6d683610-2351-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201512-005

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006424

PATCH

title:Schneider Electric has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-15-335-02

Trust: 4.9

title:SEVD-2015-329-01url:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-329-01

Trust: 0.8

title:Schneider Electric ProClima ActiveX Control code injection vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/67570

Trust: 0.6

title:Schneider Electric ProClima F1BookView ActiveX Fixes for Control Buffer Overflow Vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58873

Trust: 0.6

sources: ZDI: ZDI-15-635 // ZDI: ZDI-15-634 // ZDI: ZDI-15-632 // ZDI: ZDI-15-630 // ZDI: ZDI-15-625 // ZDI: ZDI-15-633 // ZDI: ZDI-15-631 // CNVD: CNVD-2015-07899 // JVNDB: JVNDB-2015-006424 // CNNVD: CNNVD-201512-005

EXTERNAL IDS

db:NVDid:CVE-2015-7918

Trust: 8.5

db:ICS CERTid:ICSA-15-335-02

Trust: 3.1

db:ZDIid:ZDI-15-635

Trust: 2.4

db:ZDIid:ZDI-15-634

Trust: 2.4

db:ZDIid:ZDI-15-632

Trust: 2.4

db:ZDIid:ZDI-15-630

Trust: 2.4

db:ZDIid:ZDI-15-625

Trust: 2.4

db:ZDIid:ZDI-15-633

Trust: 2.4

db:ZDIid:ZDI-15-631

Trust: 2.4

db:SCHNEIDERid:SEVD-2015-329-01

Trust: 1.7

db:CNNVDid:CNNVD-201512-005

Trust: 0.9

db:CNVDid:CNVD-2015-07899

Trust: 0.8

db:JVNDBid:JVNDB-2015-006424

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-3095

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-3093

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-3078

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-3076

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-3094

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-3092

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-3077

Trust: 0.7

db:BIDid:78421

Trust: 0.4

db:ZDIid:ZDI-15-626

Trust: 0.3

db:ZDIid:ZDI-15-628

Trust: 0.3

db:IVDid:6D683610-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-85879

Trust: 0.1

sources: IVD: 6d683610-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-15-635 // ZDI: ZDI-15-634 // ZDI: ZDI-15-632 // ZDI: ZDI-15-630 // ZDI: ZDI-15-625 // ZDI: ZDI-15-633 // ZDI: ZDI-15-631 // CNVD: CNVD-2015-07899 // VULHUB: VHN-85879 // BID: 78421 // JVNDB: JVNDB-2015-006424 // CNNVD: CNNVD-201512-005 // NVD: CVE-2015-7918

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-15-335-02

Trust: 8.0

url:http://download.schneider-electric.com/files?p_doc_ref=sevd-2015-329-01

Trust: 1.7

url:http://www.zerodayinitiative.com/advisories/zdi-15-625

Trust: 1.7

url:http://www.zerodayinitiative.com/advisories/zdi-15-630

Trust: 1.7

url:http://www.zerodayinitiative.com/advisories/zdi-15-631

Trust: 1.7

url:http://www.zerodayinitiative.com/advisories/zdi-15-632

Trust: 1.7

url:http://www.zerodayinitiative.com/advisories/zdi-15-633

Trust: 1.7

url:http://www.zerodayinitiative.com/advisories/zdi-15-634

Trust: 1.7

url:http://www.zerodayinitiative.com/advisories/zdi-15-635

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7918

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7918

Trust: 0.8

url:http://support.microsoft.com/kb/240797

Trust: 0.3

url:http://www.schneider-electric.com/en/product-range-download/2560-proclima

Trust: 0.3

url: http://www.zerodayinitiative.com/advisories/zdi-15-626

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-628

Trust: 0.3

sources: ZDI: ZDI-15-635 // ZDI: ZDI-15-634 // ZDI: ZDI-15-632 // ZDI: ZDI-15-630 // ZDI: ZDI-15-625 // ZDI: ZDI-15-633 // ZDI: ZDI-15-631 // CNVD: CNVD-2015-07899 // VULHUB: VHN-85879 // BID: 78421 // JVNDB: JVNDB-2015-006424 // CNNVD: CNNVD-201512-005 // NVD: CVE-2015-7918

CREDITS

Fritz Sands - HP Zero Day Initiative

Trust: 4.9

sources: ZDI: ZDI-15-635 // ZDI: ZDI-15-634 // ZDI: ZDI-15-632 // ZDI: ZDI-15-630 // ZDI: ZDI-15-625 // ZDI: ZDI-15-633 // ZDI: ZDI-15-631

SOURCES

db:IVDid:6d683610-2351-11e6-abef-000c29c66e3d
db:ZDIid:ZDI-15-635
db:ZDIid:ZDI-15-634
db:ZDIid:ZDI-15-632
db:ZDIid:ZDI-15-630
db:ZDIid:ZDI-15-625
db:ZDIid:ZDI-15-633
db:ZDIid:ZDI-15-631
db:CNVDid:CNVD-2015-07899
db:VULHUBid:VHN-85879
db:BIDid:78421
db:JVNDBid:JVNDB-2015-006424
db:CNNVDid:CNNVD-201512-005
db:NVDid:CVE-2015-7918

LAST UPDATE DATE

2025-04-13T23:31:32.998000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-15-635date:2015-12-08T00:00:00
db:ZDIid:ZDI-15-634date:2015-12-08T00:00:00
db:ZDIid:ZDI-15-632date:2015-12-08T00:00:00
db:ZDIid:ZDI-15-630date:2015-12-08T00:00:00
db:ZDIid:ZDI-15-625date:2015-12-08T00:00:00
db:ZDIid:ZDI-15-633date:2015-12-08T00:00:00
db:ZDIid:ZDI-15-631date:2015-12-08T00:00:00
db:CNVDid:CNVD-2015-07899date:2015-12-03T00:00:00
db:VULHUBid:VHN-85879date:2015-12-16T00:00:00
db:BIDid:78421date:2015-12-01T00:00:00
db:JVNDBid:JVNDB-2015-006424date:2015-12-17T00:00:00
db:CNNVDid:CNNVD-201512-005date:2015-12-16T00:00:00
db:NVDid:CVE-2015-7918date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:IVDid:6d683610-2351-11e6-abef-000c29c66e3ddate:2015-12-03T00:00:00
db:ZDIid:ZDI-15-635date:2015-12-08T00:00:00
db:ZDIid:ZDI-15-634date:2015-12-08T00:00:00
db:ZDIid:ZDI-15-632date:2015-12-08T00:00:00
db:ZDIid:ZDI-15-630date:2015-12-08T00:00:00
db:ZDIid:ZDI-15-625date:2015-12-08T00:00:00
db:ZDIid:ZDI-15-633date:2015-12-08T00:00:00
db:ZDIid:ZDI-15-631date:2015-12-08T00:00:00
db:CNVDid:CNVD-2015-07899date:2015-12-03T00:00:00
db:VULHUBid:VHN-85879date:2015-12-15T00:00:00
db:BIDid:78421date:2015-12-01T00:00:00
db:JVNDBid:JVNDB-2015-006424date:2015-12-17T00:00:00
db:CNNVDid:CNNVD-201512-005date:2015-12-02T00:00:00
db:NVDid:CVE-2015-7918date:2015-12-15T05:59:08.857