ID

VAR-201607-0383


CVE

CVE-2016-4512


TITLE

Eaton ELCSoft of ELCSimulator Vulnerable to stack-based buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2016-003454

DESCRIPTION

Stack-based buffer overflow in ELCSimulator in Eaton ELCSoft 2.4.01 and earlier allows remote attackers to execute arbitrary code via a long packet. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of network TCP requests by ELCSimulator.exe. A crafted request will cause a stack buffer overflow. An attacker can leverage this vulnerability to execute arbitrary code in the context of the process. Eaton ELCSoft Programming Software is a set of software for configuring a programmable logic controller. Eaton ELCSoft Programming Software is prone to multiple buffer-overflow vulnerabilities because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Failed exploits will result in denial-of-service condition. Eaton ELCSoft 2.4.01 and prior versions are vulnerable

Trust: 3.06

sources: NVD: CVE-2016-4512 // JVNDB: JVNDB-2016-003454 // ZDI: ZDI-16-407 // CNVD: CNVD-2016-04483 // BID: 91524

AFFECTED PRODUCTS

vendor:eatonmodel:elcsoftscope:lteversion:2.4.01

Trust: 1.8

vendor:eatonmodel:elcsoftscope:eqversion:2.4.01

Trust: 0.9

vendor:eatonmodel:elcsoftscope: - version: -

Trust: 0.7

vendor:eatonmodel:elcsoft programming softwarescope:lteversion:<=2.4.01

Trust: 0.6

sources: ZDI: ZDI-16-407 // CNVD: CNVD-2016-04483 // BID: 91524 // JVNDB: JVNDB-2016-003454 // CNNVD: CNNVD-201606-673 // NVD: CVE-2016-4512

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-4512
value: HIGH

Trust: 1.0

NVD: CVE-2016-4512
value: HIGH

Trust: 0.8

ZDI: CVE-2016-4512
value: HIGH

Trust: 0.7

CNVD: CNVD-2016-04483
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201606-673
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2016-4512
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.5

CNVD: CNVD-2016-04483
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2016-4512
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 3.4
version: 3.0

Trust: 1.8

sources: ZDI: ZDI-16-407 // CNVD: CNVD-2016-04483 // JVNDB: JVNDB-2016-003454 // CNNVD: CNNVD-201606-673 // NVD: CVE-2016-4512

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2016-003454 // NVD: CVE-2016-4512

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201606-673

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201606-673

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-003454

PATCH

title:ELCSoft Programming Softwareurl:http://www.eaton.in/Eaton/ProductsServices/Electrical/ProductsandServices/AutomationandControl/PLCsandHMI-PLCs/ELCSeriesPLCs/ELCSoftProgrammingSoftware/index.htm

Trust: 0.8

title:Eaton has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-16-182-01

Trust: 0.7

title:Patch for Eaton ELCSoft Programming Software Stack Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/78560

Trust: 0.6

title:Eaton ELCSoft Programming Software Fixes for stack-based buffer overflow vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=62582

Trust: 0.6

sources: ZDI: ZDI-16-407 // CNVD: CNVD-2016-04483 // JVNDB: JVNDB-2016-003454 // CNNVD: CNNVD-201606-673

EXTERNAL IDS

db:NVDid:CVE-2016-4512

Trust: 4.0

db:ICS CERTid:ICSA-16-182-01

Trust: 3.3

db:ZDIid:ZDI-16-407

Trust: 2.0

db:BIDid:91524

Trust: 1.9

db:JVNDBid:JVNDB-2016-003454

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-3697

Trust: 0.7

db:CNVDid:CNVD-2016-04483

Trust: 0.6

db:CNNVDid:CNNVD-201606-673

Trust: 0.6

db:ZDIid:ZDI-16-408

Trust: 0.3

sources: ZDI: ZDI-16-407 // CNVD: CNVD-2016-04483 // BID: 91524 // JVNDB: JVNDB-2016-003454 // CNNVD: CNNVD-201606-673 // NVD: CVE-2016-4512

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-182-01

Trust: 4.0

url:http://www.zerodayinitiative.com/advisories/zdi-16-407

Trust: 1.3

url:http://www.securityfocus.com/bid/91524

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4512

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4512

Trust: 0.8

url:http://www.eaton.com/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-16-408

Trust: 0.3

sources: ZDI: ZDI-16-407 // CNVD: CNVD-2016-04483 // BID: 91524 // JVNDB: JVNDB-2016-003454 // CNNVD: CNNVD-201606-673 // NVD: CVE-2016-4512

CREDITS

Ariele Caltabiano (kimiya)

Trust: 0.7

sources: ZDI: ZDI-16-407

SOURCES

db:ZDIid:ZDI-16-407
db:CNVDid:CNVD-2016-04483
db:BIDid:91524
db:JVNDBid:JVNDB-2016-003454
db:CNNVDid:CNNVD-201606-673
db:NVDid:CVE-2016-4512

LAST UPDATE DATE

2025-04-13T23:17:53.733000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-16-407date:2017-08-07T00:00:00
db:CNVDid:CNVD-2016-04483date:2016-07-05T00:00:00
db:BIDid:91524date:2016-07-08T23:00:00
db:JVNDBid:JVNDB-2016-003454date:2016-07-08T00:00:00
db:CNNVDid:CNNVD-201606-673date:2016-07-04T00:00:00
db:NVDid:CVE-2016-4512date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:ZDIid:ZDI-16-407date:2017-08-07T00:00:00
db:CNVDid:CNVD-2016-04483date:2016-07-05T00:00:00
db:BIDid:91524date:2016-06-30T00:00:00
db:JVNDBid:JVNDB-2016-003454date:2016-07-08T00:00:00
db:CNNVDid:CNNVD-201606-673date:2016-06-30T00:00:00
db:NVDid:CVE-2016-4512date:2016-07-03T14:59:07.727