ID

VAR-201601-0028


CVE

CVE-2016-0869


TITLE

MICROSYS PROMOTIC Heap-based buffer overflow vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2016-001332 // CNNVD: CNNVD-201601-634

DESCRIPTION

Heap-based buffer overflow in MICROSYS PROMOTIC before 8.3.11 allows remote authenticated users to cause a denial of service via a malformed HTML document. MICROSYS PROMOTIC is a Windows-based monitoring and data acquisition human-machine interface software programming suite for industrial applications. MICROSYS PROMOTIC is prone to a local heap-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit this issue to cause denial-of-service condition. Due to the nature of this issue, code-execution may be possible; however this has not been confirmed

Trust: 2.61

sources: NVD: CVE-2016-0869 // JVNDB: JVNDB-2016-001332 // CNVD: CNVD-2016-00720 // BID: 81989 // IVD: 632dcf5c-2351-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 632dcf5c-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-00720

AFFECTED PRODUCTS

vendor:microsysmodel:promoticscope:ltversion:8.3.11

Trust: 1.4

vendor:microsysmodel:promoticscope:lteversion:8.3.10

Trust: 1.0

vendor:microsysmodel:promoticscope:eqversion:8.3.10

Trust: 0.6

vendor:microsysmodel:promoticscope:eqversion:8.3.2

Trust: 0.3

vendor:microsysmodel:promoticscope:eqversion:8.2.19

Trust: 0.3

vendor:microsysmodel:promoticscope:eqversion:8.3

Trust: 0.3

vendor:microsysmodel:promoticscope:neversion:8.3.11

Trust: 0.3

vendor:promoticmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 632dcf5c-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-00720 // BID: 81989 // JVNDB: JVNDB-2016-001332 // CNNVD: CNNVD-201601-634 // NVD: CVE-2016-0869

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-0869
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-0869
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-00720
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201601-634
value: HIGH

Trust: 0.6

IVD: 632dcf5c-2351-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2016-0869
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-00720
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 632dcf5c-2351-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2016-0869
baseSeverity: MEDIUM
baseScore: 5.0
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.3
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: IVD: 632dcf5c-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-00720 // JVNDB: JVNDB-2016-001332 // CNNVD: CNNVD-201601-634 // NVD: CVE-2016-0869

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2016-001332 // NVD: CVE-2016-0869

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201601-634

TYPE

Buffer overflow

Trust: 0.8

sources: IVD: 632dcf5c-2351-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201601-634

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001332

PATCH

title:Version 8.3.11 (from 19.1.2016) - stable versionurl:http://www.promotic.eu/en/pmdoc/NewsPm803.htm#ver80311

Trust: 0.8

title:Patch for MICROSYS PROMOTIC heap buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/70952

Trust: 0.6

title:MICROSYS PROMOTIC Fixes for heap-based buffer overflow vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59949

Trust: 0.6

sources: CNVD: CNVD-2016-00720 // JVNDB: JVNDB-2016-001332 // CNNVD: CNNVD-201601-634

EXTERNAL IDS

db:NVDid:CVE-2016-0869

Trust: 3.5

db:ICS CERTid:ICSA-16-026-01

Trust: 2.4

db:CNVDid:CNVD-2016-00720

Trust: 0.8

db:CNNVDid:CNNVD-201601-634

Trust: 0.8

db:JVNDBid:JVNDB-2016-001332

Trust: 0.8

db:ZDIid:ZDI-15-091

Trust: 0.3

db:ICS CERTid:ICSA-15-062-01

Trust: 0.3

db:BIDid:81989

Trust: 0.3

db:IVDid:632DCF5C-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 632dcf5c-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-00720 // BID: 81989 // JVNDB: JVNDB-2016-001332 // CNNVD: CNNVD-201601-634 // NVD: CVE-2016-0869

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-026-01

Trust: 2.4

url:http://www.promotic.eu/en/pmdoc/newspm803.htm#ver80311

Trust: 1.6

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0869

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0869

Trust: 0.8

url:http://www.promotic.eu/en/index.htm

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-15-062-01

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-091/

Trust: 0.3

sources: CNVD: CNVD-2016-00720 // BID: 81989 // JVNDB: JVNDB-2016-001332 // CNNVD: CNNVD-201601-634 // NVD: CVE-2016-0869

CREDITS

Praveen Darshanam of Versa Networks

Trust: 0.3

sources: BID: 81989

SOURCES

db:IVDid:632dcf5c-2351-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2016-00720
db:BIDid:81989
db:JVNDBid:JVNDB-2016-001332
db:CNNVDid:CNNVD-201601-634
db:NVDid:CVE-2016-0869

LAST UPDATE DATE

2025-04-13T23:22:29.190000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-00720date:2016-02-01T00:00:00
db:BIDid:81989date:2016-01-26T00:00:00
db:JVNDBid:JVNDB-2016-001332date:2016-01-29T00:00:00
db:CNNVDid:CNNVD-201601-634date:2016-01-27T00:00:00
db:NVDid:CVE-2016-0869date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:IVDid:632dcf5c-2351-11e6-abef-000c29c66e3ddate:2016-02-01T00:00:00
db:CNVDid:CNVD-2016-00720date:2016-02-01T00:00:00
db:BIDid:81989date:2016-01-26T00:00:00
db:JVNDBid:JVNDB-2016-001332date:2016-01-29T00:00:00
db:CNNVDid:CNNVD-201601-634date:2016-01-27T00:00:00
db:NVDid:CVE-2016-0869date:2016-01-26T19:59:02.373