ID

VAR-201901-0718


CVE

CVE-2018-0651


TITLE

Buffer overflow vulnerability in license management function of multiple Yokogawa products

Trust: 0.8

sources: JVNDB: JVNDB-2018-006408

DESCRIPTION

Buffer overflow in the license management function of YOKOGAWA products (iDefine for ProSafe-RS R1.16.3 and earlier, STARDOM VDS R7.50 and earlier, STARDOM FCN/FCJ Simulator R4.20 and earlier, ASTPLANNER R15.01 and earlier, TriFellows V5.04 and earlier) allows remote attackers to stop the license management function or execute an arbitrary program via unspecified vectors. Multiple Yokogawa Products are prone to stack-based buffer overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely cause a denial-of-service condition. Yokogawa ASTPLANNER, etc. are all products of Japan's Yokogawa Electric (Yokogawa) company. Yokogawa ASTPLANNER is a production planning system; iDefine for ProSafe-RS is a functional safety management tool in the system safety life cycle

Trust: 1.98

sources: NVD: CVE-2018-0651 // JVNDB: JVNDB-2018-006408 // BID: 105124 // VULHUB: VHN-118853

AFFECTED PRODUCTS

vendor:yokogawamodel:trifellowsscope:lteversion:v5.04

Trust: 1.0

vendor:yokogawamodel:stardom fcn\/fcj simulatorscope:lteversion:r4.20

Trust: 1.0

vendor:yokogawamodel:astplannerscope:lteversion:r15.01

Trust: 1.0

vendor:yokogawamodel:idefine for prosafe-rsscope:lteversion:r1.16.3

Trust: 1.0

vendor:yokogawamodel:stardom versatile data serverscope:lteversion:r7.50

Trust: 1.0

vendor:yokogawa electricmodel:astplannerscope:lteversion:r15.01

Trust: 0.8

vendor:yokogawa electricmodel:idefine for prosafe-rsscope:lteversion:r1.16.3

Trust: 0.8

vendor:yokogawa electricmodel:stardom fcn/fcj simulatorscope:lteversion:r4.20

Trust: 0.8

vendor:yokogawa electricmodel:stardom vdsscope:lteversion:r7.50

Trust: 0.8

vendor:yokogawa electricmodel:trifellowsscope:lteversion:v5.04

Trust: 0.8

vendor:yokogawamodel:trifellowsscope:eqversion:5.04

Trust: 0.3

vendor:yokogawamodel:stardom vds r7.50scope: - version: -

Trust: 0.3

vendor:yokogawamodel:idefine for prosafe-rs r1.16.3scope: - version: -

Trust: 0.3

vendor:yokogawamodel:fcn/fcj simulator r4.20scope: - version: -

Trust: 0.3

vendor:yokogawamodel:astplanner r15.01scope: - version: -

Trust: 0.3

vendor:yokogawamodel:trifellowsscope:neversion:5.10

Trust: 0.3

vendor:yokogawamodel:stardom vds r8.10scope:neversion: -

Trust: 0.3

vendor:yokogawamodel:idefine for prosafe-rs r1.16.4scope:neversion: -

Trust: 0.3

vendor:yokogawamodel:astplanner r15.02.01scope:neversion: -

Trust: 0.3

sources: BID: 105124 // JVNDB: JVNDB-2018-006408 // NVD: CVE-2018-0651

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0651
value: CRITICAL

Trust: 1.0

JPCERT/CC: JVNDB-2018-006408
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201808-636
value: HIGH

Trust: 0.6

VULHUB: VHN-118853
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0651
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

JPCERT/CC: JVNDB-2018-006408
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-118853
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0651
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

JPCERT/CC: JVNDB-2018-006408
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-118853 // JVNDB: JVNDB-2018-006408 // CNNVD: CNNVD-201808-636 // NVD: CVE-2018-0651

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-118853 // JVNDB: JVNDB-2018-006408 // NVD: CVE-2018-0651

THREAT TYPE

network

Trust: 0.3

sources: BID: 105124

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201808-636

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-006408

PATCH

title:YSAR-18-0006: 複数の横河製品のライセンス管理機能にバッファオーバーフローの脆弱性url:https://www.yokogawa.co.jp/library/resources/white-papers/yokogawa-security-advisory-report-list/

Trust: 0.8

title:Multiple Yokogawa Product Buffer Error Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84197

Trust: 0.6

sources: JVNDB: JVNDB-2018-006408 // CNNVD: CNNVD-201808-636

EXTERNAL IDS

db:NVDid:CVE-2018-0651

Trust: 2.8

db:JVNid:JVNVU93845358

Trust: 2.5

db:BIDid:105124

Trust: 1.4

db:ICS CERTid:ICSA-18-233-01

Trust: 1.1

db:JVNDBid:JVNDB-2018-006408

Trust: 0.8

db:CNNVDid:CNNVD-201808-636

Trust: 0.7

db:SEEBUGid:SSVID-98911

Trust: 0.1

db:VULHUBid:VHN-118853

Trust: 0.1

sources: VULHUB: VHN-118853 // BID: 105124 // JVNDB: JVNDB-2018-006408 // CNNVD: CNNVD-201808-636 // NVD: CVE-2018-0651

REFERENCES

url:https://jvn.jp/vu/jvnvu93845358/

Trust: 2.5

url:https://web-material3.yokogawa.com/ysar-18-0006-e.pdf

Trust: 1.7

url:http://www.securityfocus.com/bid/105124

Trust: 1.1

url:https://ics-cert.us-cert.gov/advisories/icsa-18-233-01

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0651

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0651

Trust: 0.8

url:https://www.yokogawa.com/in/

Trust: 0.3

sources: VULHUB: VHN-118853 // BID: 105124 // JVNDB: JVNDB-2018-006408 // CNNVD: CNNVD-201808-636 // NVD: CVE-2018-0651

CREDITS

Yokogawa worked with JPCERT

Trust: 0.6

sources: CNNVD: CNNVD-201808-636

SOURCES

db:VULHUBid:VHN-118853
db:BIDid:105124
db:JVNDBid:JVNDB-2018-006408
db:CNNVDid:CNNVD-201808-636
db:NVDid:CVE-2018-0651

LAST UPDATE DATE

2024-11-23T22:12:10.807000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-118853date:2019-02-11T00:00:00
db:BIDid:105124date:2018-08-21T00:00:00
db:JVNDBid:JVNDB-2018-006408date:2019-08-27T00:00:00
db:CNNVDid:CNNVD-201808-636date:2019-02-15T00:00:00
db:NVDid:CVE-2018-0651date:2024-11-21T03:38:40.040

SOURCES RELEASE DATE

db:VULHUBid:VHN-118853date:2019-01-09T00:00:00
db:BIDid:105124date:2018-08-21T00:00:00
db:JVNDBid:JVNDB-2018-006408date:2018-08-20T00:00:00
db:CNNVDid:CNNVD-201808-636date:2018-08-22T00:00:00
db:NVDid:CVE-2018-0651date:2019-01-09T23:29:01.310