ID

VAR-201804-0783


CVE

CVE-2017-9636


TITLE

Mitsubishi E-Designer Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-013250

DESCRIPTION

Mitsubishi E-Designer, Version 7.52 Build 344 contains five code sections which may be exploited to overwrite the heap. This can result in arbitrary code execution, compromised data integrity, denial of service, and system crash. Mitsubishi E-Designer Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mitsubishi Electric E-Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within processing of a driver configuration file when initializing the BEMicroLogix component. When parsing the property TCP_IP_Address, the process fails to properly validate the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code in the context of the Administrator. E-Designer is an E-series programming software from Mitsubishi Electric Europe B.V. Mitsubishi Electric Europe B.V. Mitsubishi E-Designer is prone to the following vulnerabilities: 1. Multiple stack-based overflow vulnerabilities. 2. Multiple heap-based overflow vulnerabilities. 3. Multiple denial-of-service overflow vulnerabilities. Failed exploit attempts will result in denial-of-service conditions

Trust: 5.85

sources: NVD: CVE-2017-9636 // JVNDB: JVNDB-2017-013250 // ZDI: ZDI-17-510 // ZDI: ZDI-17-518 // ZDI: ZDI-17-517 // ZDI: ZDI-17-512 // ZDI: ZDI-17-511 // CNVD: CNVD-2017-22836 // BID: 100097 // IVD: de3e14c2-eb4d-4863-9a11-51565da2e669 // VULMON: CVE-2017-9636

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: de3e14c2-eb4d-4863-9a11-51565da2e669 // CNVD: CNVD-2017-22836

AFFECTED PRODUCTS

vendor:mitsubishi electricmodel:e-designerscope: - version: -

Trust: 3.5

vendor:mitsubishielectricmodel:e-designerscope:eqversion:7.52

Trust: 1.6

vendor:mitsubishi electricmodel:e-designerscope:eqversion:7.52 build 344

Trust: 0.8

vendor:mitsubishimodel:electric europe b.v. e-designer buildscope:eqversion:7.52344

Trust: 0.6

vendor:mitsubishimodel:electric e-designer buildscope:eqversion:7.52344

Trust: 0.3

vendor:e designermodel: - scope:eqversion:7.52

Trust: 0.2

sources: IVD: de3e14c2-eb4d-4863-9a11-51565da2e669 // ZDI: ZDI-17-510 // ZDI: ZDI-17-518 // ZDI: ZDI-17-517 // ZDI: ZDI-17-512 // ZDI: ZDI-17-511 // CNVD: CNVD-2017-22836 // BID: 100097 // JVNDB: JVNDB-2017-013250 // CNNVD: CNNVD-201706-867 // NVD: CVE-2017-9636

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2017-9636
value: HIGH

Trust: 3.5

nvd@nist.gov: CVE-2017-9636
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-9636
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2017-22836
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201706-867
value: CRITICAL

Trust: 0.6

IVD: de3e14c2-eb4d-4863-9a11-51565da2e669
value: CRITICAL

Trust: 0.2

VULMON: CVE-2017-9636
value: HIGH

Trust: 0.1

ZDI: CVE-2017-9636
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 3.5

nvd@nist.gov: CVE-2017-9636
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2017-22836
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: de3e14c2-eb4d-4863-9a11-51565da2e669
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2017-9636
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: de3e14c2-eb4d-4863-9a11-51565da2e669 // ZDI: ZDI-17-510 // ZDI: ZDI-17-518 // ZDI: ZDI-17-517 // ZDI: ZDI-17-512 // ZDI: ZDI-17-511 // CNVD: CNVD-2017-22836 // VULMON: CVE-2017-9636 // JVNDB: JVNDB-2017-013250 // CNNVD: CNNVD-201706-867 // NVD: CVE-2017-9636

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

problemtype:CWE-122

Trust: 1.0

sources: JVNDB: JVNDB-2017-013250 // NVD: CVE-2017-9636

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201706-867

TYPE

Buffer error

Trust: 0.8

sources: IVD: de3e14c2-eb4d-4863-9a11-51565da2e669 // CNNVD: CNNVD-201706-867

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-013250

PATCH

title:Mitsubishi Electric has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-17-213-01

Trust: 3.5

title:Top Pageurl:http://www.mitsubishielectric.co.jp/fa/

Trust: 0.8

title:Patch for Mitsubishi Electric Europe B.V. E-Designer Buffer Overflow Vulnerability (CNVD-2017-22836)url:https://www.cnvd.org.cn/patchInfo/show/100853

Trust: 0.6

sources: ZDI: ZDI-17-510 // ZDI: ZDI-17-518 // ZDI: ZDI-17-517 // ZDI: ZDI-17-512 // ZDI: ZDI-17-511 // CNVD: CNVD-2017-22836 // JVNDB: JVNDB-2017-013250

EXTERNAL IDS

db:NVDid:CVE-2017-9636

Trust: 7.1

db:ICS CERTid:ICSA-17-213-01

Trust: 3.4

db:BIDid:100097

Trust: 2.0

db:CNVDid:CNVD-2017-22836

Trust: 0.8

db:CNNVDid:CNNVD-201706-867

Trust: 0.8

db:JVNDBid:JVNDB-2017-013250

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-3802

Trust: 0.7

db:ZDIid:ZDI-17-510

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-3794

Trust: 0.7

db:ZDIid:ZDI-17-518

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-3795

Trust: 0.7

db:ZDIid:ZDI-17-517

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-3800

Trust: 0.7

db:ZDIid:ZDI-17-512

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-3801

Trust: 0.7

db:ZDIid:ZDI-17-511

Trust: 0.7

db:IVDid:DE3E14C2-EB4D-4863-9A11-51565DA2E669

Trust: 0.2

db:VULMONid:CVE-2017-9636

Trust: 0.1

sources: IVD: de3e14c2-eb4d-4863-9a11-51565da2e669 // ZDI: ZDI-17-510 // ZDI: ZDI-17-518 // ZDI: ZDI-17-517 // ZDI: ZDI-17-512 // ZDI: ZDI-17-511 // CNVD: CNVD-2017-22836 // VULMON: CVE-2017-9636 // BID: 100097 // JVNDB: JVNDB-2017-013250 // CNNVD: CNNVD-201706-867 // NVD: CVE-2017-9636

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-213-01

Trust: 6.9

url:http://www.securityfocus.com/bid/100097

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9636

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-9636

Trust: 0.8

url:http://www.mrslim.com/home.asp

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: ZDI: ZDI-17-510 // ZDI: ZDI-17-518 // ZDI: ZDI-17-517 // ZDI: ZDI-17-512 // ZDI: ZDI-17-511 // CNVD: CNVD-2017-22836 // VULMON: CVE-2017-9636 // BID: 100097 // JVNDB: JVNDB-2017-013250 // CNNVD: CNNVD-201706-867 // NVD: CVE-2017-9636

CREDITS

rgod

Trust: 3.5

sources: ZDI: ZDI-17-510 // ZDI: ZDI-17-518 // ZDI: ZDI-17-517 // ZDI: ZDI-17-512 // ZDI: ZDI-17-511

SOURCES

db:IVDid:de3e14c2-eb4d-4863-9a11-51565da2e669
db:ZDIid:ZDI-17-510
db:ZDIid:ZDI-17-518
db:ZDIid:ZDI-17-517
db:ZDIid:ZDI-17-512
db:ZDIid:ZDI-17-511
db:CNVDid:CNVD-2017-22836
db:VULMONid:CVE-2017-9636
db:BIDid:100097
db:JVNDBid:JVNDB-2017-013250
db:CNNVDid:CNNVD-201706-867
db:NVDid:CVE-2017-9636

LAST UPDATE DATE

2024-11-23T22:00:37.020000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-510date:2017-08-01T00:00:00
db:ZDIid:ZDI-17-518date:2017-08-01T00:00:00
db:ZDIid:ZDI-17-517date:2017-08-01T00:00:00
db:ZDIid:ZDI-17-512date:2017-08-01T00:00:00
db:ZDIid:ZDI-17-511date:2017-08-01T00:00:00
db:CNVDid:CNVD-2017-22836date:2017-08-25T00:00:00
db:VULMONid:CVE-2017-9636date:2019-10-09T00:00:00
db:BIDid:100097date:2017-08-01T00:00:00
db:JVNDBid:JVNDB-2017-013250date:2018-06-12T00:00:00
db:CNNVDid:CNNVD-201706-867date:2019-10-17T00:00:00
db:NVDid:CVE-2017-9636date:2024-11-21T03:36:33.803

SOURCES RELEASE DATE

db:IVDid:de3e14c2-eb4d-4863-9a11-51565da2e669date:2017-08-25T00:00:00
db:ZDIid:ZDI-17-510date:2017-08-01T00:00:00
db:ZDIid:ZDI-17-518date:2017-08-01T00:00:00
db:ZDIid:ZDI-17-517date:2017-08-01T00:00:00
db:ZDIid:ZDI-17-512date:2017-08-01T00:00:00
db:ZDIid:ZDI-17-511date:2017-08-01T00:00:00
db:CNVDid:CNVD-2017-22836date:2017-08-25T00:00:00
db:VULMONid:CVE-2017-9636date:2018-04-17T00:00:00
db:BIDid:100097date:2017-08-01T00:00:00
db:JVNDBid:JVNDB-2017-013250date:2018-06-12T00:00:00
db:CNNVDid:CNNVD-201706-867date:2017-06-21T00:00:00
db:NVDid:CVE-2017-9636date:2018-04-17T14:29:00.417