ID

VAR-201903-0641


CVE

CVE-2015-6458


TITLE

Moxa SoftCMS Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2015-008240

DESCRIPTION

Moxa SoftCMS 1.3 and prior is susceptible to a buffer overflow condition that may crash or allow remote code execution. Moxa released SoftCMS version 1.4 on June 1, 2015, to address the vulnerability. Moxa SoftCMS Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the AudioRecord method in the RTSPVIDEO ActiveX control. The implementation copies the user-supplied string for the ip parameter to a fixed-size stack buffer without validating its size, which can lead to a stack buffer overflow. An attacker can leverage this vulnerability to execute arbitrary code under the context of the process. Moxa SoftCMS is a central management software for managing large surveillance systems. Moxa SoftCMS 1.3 and earlier has a buffer overflow vulnerability. Moxa SoftCMS is prone to multiple unspecified buffer-overflow vulnerabilities because it fails to properly bounds-check user supplied input. The software supports real-time video monitoring, video playback and event management, etc. The vulnerability is caused by the fact that the program does not correctly verify the size of the 'ip' parameter

Trust: 3.15

sources: NVD: CVE-2015-6458 // JVNDB: JVNDB-2015-008240 // ZDI: ZDI-15-433 // CNVD: CNVD-2015-05788 // BID: 76509 // VULHUB: VHN-84419

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-05788

AFFECTED PRODUCTS

vendor:moxamodel:softcmsscope:lteversion:1.3

Trust: 1.8

vendor:moxamodel:softcmsscope: - version: -

Trust: 0.7

vendor:moxamodel:softcmsscope:lteversion:<=1.3

Trust: 0.6

sources: ZDI: ZDI-15-433 // CNVD: CNVD-2015-05788 // JVNDB: JVNDB-2015-008240 // NVD: CVE-2015-6458

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6458
value: HIGH

Trust: 1.0

NVD: CVE-2015-6458
value: HIGH

Trust: 0.8

ZDI: CVE-2015-6458
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2015-05788
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201509-138
value: HIGH

Trust: 0.6

VULHUB: VHN-84419
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-6458
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.5

CNVD: CNVD-2015-05788
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-84419
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-6458
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: ZDI: ZDI-15-433 // CNVD: CNVD-2015-05788 // VULHUB: VHN-84419 // JVNDB: JVNDB-2015-008240 // CNNVD: CNNVD-201509-138 // NVD: CVE-2015-6458

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

problemtype:CWE-120

Trust: 1.0

sources: VULHUB: VHN-84419 // JVNDB: JVNDB-2015-008240 // NVD: CVE-2015-6458

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201509-138

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201509-138

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-008240

PATCH

title:Top Pageurl:https://www.moxa.com/en/

Trust: 0.8

title:Moxa has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-15-239-01

Trust: 0.7

title:Patch for Moxa SoftCMS Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/63509

Trust: 0.6

sources: ZDI: ZDI-15-433 // CNVD: CNVD-2015-05788 // JVNDB: JVNDB-2015-008240

EXTERNAL IDS

db:NVDid:CVE-2015-6458

Trust: 4.1

db:ICS CERTid:ICSA-15-239-01

Trust: 3.4

db:ZDIid:ZDI-15-433

Trust: 1.0

db:JVNDBid:JVNDB-2015-008240

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2952

Trust: 0.7

db:CNNVDid:CNNVD-201509-138

Trust: 0.7

db:CNVDid:CNVD-2015-05788

Trust: 0.6

db:ZDIid:ZDI-15-430

Trust: 0.3

db:ZDIid:ZDI-15-431

Trust: 0.3

db:ZDIid:ZDI-15-429

Trust: 0.3

db:ZDIid:ZDI-15-436

Trust: 0.3

db:ZDIid:ZDI-15-432

Trust: 0.3

db:ZDIid:ZDI-15-435

Trust: 0.3

db:ZDIid:ZDI-15-437

Trust: 0.3

db:ZDIid:ZDI-15-434

Trust: 0.3

db:BIDid:76509

Trust: 0.3

db:VULHUBid:VHN-84419

Trust: 0.1

sources: ZDI: ZDI-15-433 // CNVD: CNVD-2015-05788 // VULHUB: VHN-84419 // BID: 76509 // JVNDB: JVNDB-2015-008240 // CNNVD: CNNVD-201509-138 // NVD: CVE-2015-6458

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-15-239-01

Trust: 4.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6458

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6458

Trust: 0.8

url:http://www.moxa.com/product/softcms.htm

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-429/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-430/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-431/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-432/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-434/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-435/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-436/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-437/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-433/

Trust: 0.3

sources: ZDI: ZDI-15-433 // CNVD: CNVD-2015-05788 // VULHUB: VHN-84419 // BID: 76509 // JVNDB: JVNDB-2015-008240 // CNNVD: CNNVD-201509-138 // NVD: CVE-2015-6458

CREDITS

Carsten Eiram - Risk Based Security

Trust: 1.3

sources: ZDI: ZDI-15-433 // CNNVD: CNNVD-201509-138

SOURCES

db:ZDIid:ZDI-15-433
db:CNVDid:CNVD-2015-05788
db:VULHUBid:VHN-84419
db:BIDid:76509
db:JVNDBid:JVNDB-2015-008240
db:CNNVDid:CNNVD-201509-138
db:NVDid:CVE-2015-6458

LAST UPDATE DATE

2024-11-23T21:52:27.181000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-15-433date:2015-09-08T00:00:00
db:CNVDid:CNVD-2015-05788date:2015-09-06T00:00:00
db:VULHUBid:VHN-84419date:2019-10-09T00:00:00
db:BIDid:76509date:2015-11-03T19:14:00
db:JVNDBid:JVNDB-2015-008240date:2019-04-22T00:00:00
db:CNNVDid:CNNVD-201509-138date:2019-04-01T00:00:00
db:NVDid:CVE-2015-6458date:2024-11-21T02:35:00.297

SOURCES RELEASE DATE

db:ZDIid:ZDI-15-433date:2015-09-08T00:00:00
db:CNVDid:CNVD-2015-05788date:2015-09-06T00:00:00
db:VULHUBid:VHN-84419date:2019-03-21T00:00:00
db:BIDid:76509date:2015-08-27T00:00:00
db:JVNDBid:JVNDB-2015-008240date:2019-04-22T00:00:00
db:CNNVDid:CNNVD-201509-138date:2015-09-10T00:00:00
db:NVDid:CVE-2015-6458date:2019-03-21T20:29:00.297