ID

VAR-201704-1016


CVE

CVE-2017-6035


TITLE

Wecon Technologies LEVI Studio HMI Editor Buffer Overflow Vulnerability

Trust: 0.8

sources: IVD: 0228e4ff-a75c-486a-bf64-87462b6e7289 // CNVD: CNVD-2017-05683

DESCRIPTION

A Stack-Based Buffer Overflow issue was discovered in Wecon Technologies LEVI Studio HMI Editor before 1.8.1. This vulnerability causes a buffer overflow, which could result in denial of service when a malicious project file is run on the system. WECON products are widely used in machinery, metallurgy, chemical, petroleum and other industries. An attacker could exploit the vulnerability to execute arbitrary code in the context of the user running the affected application. 1. A stack-based buffer-overflow vulnerability 2. Failed exploit attempts will likely cause denial-of-service conditions

Trust: 2.61

sources: NVD: CVE-2017-6035 // JVNDB: JVNDB-2017-003631 // CNVD: CNVD-2017-05683 // BID: 97639 // IVD: 0228e4ff-a75c-486a-bf64-87462b6e7289

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 0228e4ff-a75c-486a-bf64-87462b6e7289 // CNVD: CNVD-2017-05683

AFFECTED PRODUCTS

vendor:we conmodel:levi studio hmi editorscope:lteversion:1.8.0

Trust: 1.0

vendor:weconmodel:levistudioscope:ltversion:hmi editor 1.8.1

Trust: 0.8

vendor:weconmodel:levi studio hmi editorscope:ltversion:1.8.1

Trust: 0.6

vendor:we conmodel:levi studio hmi editorscope:eqversion:1.8.0

Trust: 0.6

vendor:weconmodel:levi studio hmi editorscope:eqversion:0

Trust: 0.3

vendor:weconmodel:levi studio hmi editorscope:neversion:1.8.1

Trust: 0.3

vendor:levi studio hmi editormodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 0228e4ff-a75c-486a-bf64-87462b6e7289 // CNVD: CNVD-2017-05683 // BID: 97639 // JVNDB: JVNDB-2017-003631 // CNNVD: CNNVD-201704-976 // NVD: CVE-2017-6035

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6035
value: HIGH

Trust: 1.0

NVD: CVE-2017-6035
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-05683
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201704-976
value: HIGH

Trust: 0.6

IVD: 0228e4ff-a75c-486a-bf64-87462b6e7289
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2017-6035
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-05683
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 0228e4ff-a75c-486a-bf64-87462b6e7289
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2017-6035
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: 0228e4ff-a75c-486a-bf64-87462b6e7289 // CNVD: CNVD-2017-05683 // JVNDB: JVNDB-2017-003631 // CNNVD: CNNVD-201704-976 // NVD: CVE-2017-6035

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

problemtype:CWE-121

Trust: 1.0

sources: JVNDB: JVNDB-2017-003631 // NVD: CVE-2017-6035

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201704-976

TYPE

Buffer error

Trust: 0.8

sources: IVD: 0228e4ff-a75c-486a-bf64-87462b6e7289 // CNNVD: CNNVD-201704-976

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-003631

PATCH

title:Top Pageurl:http://www.we-con.com.cn/en/

Trust: 0.8

title:Wecon Technologies LEVI Studio HMI Editor Buffer Overflow Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/92972

Trust: 0.6

title:Wecon Technologies LEVI Studio HMI Editor Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70245

Trust: 0.6

sources: CNVD: CNVD-2017-05683 // JVNDB: JVNDB-2017-003631 // CNNVD: CNNVD-201704-976

EXTERNAL IDS

db:NVDid:CVE-2017-6035

Trust: 3.5

db:ICS CERTid:ICSA-17-103-01

Trust: 2.7

db:BIDid:97639

Trust: 2.5

db:CNVDid:CNVD-2017-05683

Trust: 0.8

db:CNNVDid:CNNVD-201704-976

Trust: 0.8

db:JVNDBid:JVNDB-2017-003631

Trust: 0.8

db:IVDid:0228E4FF-A75C-486A-BF64-87462B6E7289

Trust: 0.2

sources: IVD: 0228e4ff-a75c-486a-bf64-87462b6e7289 // CNVD: CNVD-2017-05683 // BID: 97639 // JVNDB: JVNDB-2017-003631 // CNNVD: CNNVD-201704-976 // NVD: CVE-2017-6035

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-103-01

Trust: 2.7

url:http://www.securityfocus.com/bid/97639

Trust: 2.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6035

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6035

Trust: 0.8

url:http://www.we-con.com.cn/en/

Trust: 0.3

sources: CNVD: CNVD-2017-05683 // BID: 97639 // JVNDB: JVNDB-2017-003631 // CNNVD: CNNVD-201704-976 // NVD: CVE-2017-6035

CREDITS

working with iDefense Labs.,Andrea (rgod) Micalizzi

Trust: 0.6

sources: CNNVD: CNNVD-201704-976

SOURCES

db:IVDid:0228e4ff-a75c-486a-bf64-87462b6e7289
db:CNVDid:CNVD-2017-05683
db:BIDid:97639
db:JVNDBid:JVNDB-2017-003631
db:CNNVDid:CNNVD-201704-976
db:NVDid:CVE-2017-6035

LAST UPDATE DATE

2025-04-20T23:13:12.399000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-05683date:2017-05-01T00:00:00
db:BIDid:97639date:2017-04-18T00:06:00
db:JVNDBid:JVNDB-2017-003631date:2017-05-31T00:00:00
db:CNNVDid:CNNVD-201704-976date:2019-10-17T00:00:00
db:NVDid:CVE-2017-6035date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:0228e4ff-a75c-486a-bf64-87462b6e7289date:2017-05-01T00:00:00
db:CNVDid:CNVD-2017-05683date:2017-05-01T00:00:00
db:BIDid:97639date:2017-04-13T00:00:00
db:JVNDBid:JVNDB-2017-003631date:2017-05-31T00:00:00
db:CNNVDid:CNNVD-201704-976date:2017-04-13T00:00:00
db:NVDid:CVE-2017-6035date:2017-04-27T00:59:00.147