ID

VAR-201708-1568


TITLE

Delta Industrial Automation PMSoft Stack Buffer Overflow Vulnerability

Trust: 1.0

sources: IVD: 7d801222-463f-11e9-b04c-000c29342cb1 // IVD: f560a313-9806-49aa-9f7e-d109ad66f265 // CNVD: CNVD-2017-22826

DESCRIPTION

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation PMSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within parsing of information for a TTreeView object in a new-format ppm project file. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process. Delta Industrial Automation is the industry automation vendor for power management and cooling solutions worldwide. WPLSoft and PMSoft are Delta's PLC programming software. The length of the data provided by the user is not verified

Trust: 1.53

sources: ZDI: ZDI-17-707 // CNVD: CNVD-2017-22826 // IVD: 7d801222-463f-11e9-b04c-000c29342cb1 // IVD: f560a313-9806-49aa-9f7e-d109ad66f265

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 7d801222-463f-11e9-b04c-000c29342cb1 // IVD: f560a313-9806-49aa-9f7e-d109ad66f265 // CNVD: CNVD-2017-22826

AFFECTED PRODUCTS

vendor:delta industrial automationmodel:pmsoftscope: - version: -

Trust: 0.7

vendor:deltamodel:industrial automation pmsoftscope: - version: -

Trust: 0.6

vendor:deltamodel:industrial automation pmsoftscope:eqversion:*

Trust: 0.4

sources: IVD: 7d801222-463f-11e9-b04c-000c29342cb1 // IVD: f560a313-9806-49aa-9f7e-d109ad66f265 // ZDI: ZDI-17-707 // CNVD: CNVD-2017-22826

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: ZDI-17-707
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2017-22826
value: MEDIUM

Trust: 0.6

IVD: 7d801222-463f-11e9-b04c-000c29342cb1
value: MEDIUM

Trust: 0.2

IVD: f560a313-9806-49aa-9f7e-d109ad66f265
value: MEDIUM

Trust: 0.2

ZDI: ZDI-17-707
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

CNVD: CNVD-2017-22826
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 7d801222-463f-11e9-b04c-000c29342cb1
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: f560a313-9806-49aa-9f7e-d109ad66f265
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 7d801222-463f-11e9-b04c-000c29342cb1 // IVD: f560a313-9806-49aa-9f7e-d109ad66f265 // ZDI: ZDI-17-707 // CNVD: CNVD-2017-22826

TYPE

Buffer overflow

Trust: 0.4

sources: IVD: 7d801222-463f-11e9-b04c-000c29342cb1 // IVD: f560a313-9806-49aa-9f7e-d109ad66f265

PATCH

title:Delta Industrial Automation PMSoft Stack Buffer Overflow Vulnerability Patchurl:https://www.cnvd.org.cn/patchinfo/show/146941

Trust: 0.6

sources: CNVD: CNVD-2017-22826

EXTERNAL IDS

db:ZDIid:ZDI-17-707

Trust: 1.3

db:CNVDid:CNVD-2017-22826

Trust: 1.0

db:ZDI_CANid:ZDI-CAN-4111

Trust: 0.7

db:IVDid:7D801222-463F-11E9-B04C-000C29342CB1

Trust: 0.2

db:IVDid:F560A313-9806-49AA-9F7E-D109AD66F265

Trust: 0.2

sources: IVD: 7d801222-463f-11e9-b04c-000c29342cb1 // IVD: f560a313-9806-49aa-9f7e-d109ad66f265 // ZDI: ZDI-17-707 // CNVD: CNVD-2017-22826

REFERENCES

url:http://www.zerodayinitiative.com/advisories/zdi-17-707/

Trust: 0.6

sources: CNVD: CNVD-2017-22826

CREDITS

Ghirmay Desta

Trust: 0.7

sources: ZDI: ZDI-17-707

SOURCES

db:IVDid:7d801222-463f-11e9-b04c-000c29342cb1
db:IVDid:f560a313-9806-49aa-9f7e-d109ad66f265
db:ZDIid:ZDI-17-707
db:CNVDid:CNVD-2017-22826

LAST UPDATE DATE

2022-05-17T02:10:31.123000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-707date:2017-08-24T00:00:00
db:CNVDid:CNVD-2017-22826date:2018-12-12T00:00:00

SOURCES RELEASE DATE

db:IVDid:7d801222-463f-11e9-b04c-000c29342cb1date:2017-08-25T00:00:00
db:IVDid:f560a313-9806-49aa-9f7e-d109ad66f265date:2017-08-25T00:00:00
db:ZDIid:ZDI-17-707date:2017-08-24T00:00:00
db:CNVDid:CNVD-2017-22826date:2017-08-25T00:00:00