Executive Summary

Summary
Title WellinTech KingView 6.53 remote heap overflow vulnerability
Informations
Name VU#180119 First vendor Publication 2011-01-12
Vendor VU-CERT Last vendor Modification 2011-01-18
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#180119

WellinTech KingView 6.53 remote heap overflow vulnerability

Overview

WellinTech KingView 6.53 contains a remote heap overflow vulnerability in the HistorySrv process which may allow a remote, unauthenticated attacker to execute arbitrary code.

I. Description

According to WellinTech's website: "KingView software is a high-pormance production which can be used to building a data information service platform in automatic field. KingView software can provide graphic visualization which takes your operations management, control and optimization. KingView is widely used in power, water conservancy,buildings, coalmine, environmental protection, metallurgy and so on." KingView runs a HistorySrv service that listens on port 777 that listens for incoming connections. This service is vulnerable to a remote heap overflow when a payload containing malicious Flink and Blink pointers are sent to the service.

Exploit code for this vulnerability is publicly available.

II. Impact

An attacker can cause the service to crash and may be able to execute arbitrary code as the user.

III. Solution

According to WellinTech's website a patch (version 6.53(2010-12-15)) has been issued to address this vulnerability.

Restrict Access

Enable firewall rules to restrict access for port 777/tcp to only trusted sources.

Vendor Information

VendorStatusDate NotifiedDate Updated
WellinTechAffected2011-01-18

References

http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html
http://www.us-cert.gov/control_systems/pdf/ICSA-11-017-01.pdf
http://thesauceofutterpwnage.blogspot.com/2011/01/wellintech-issues-security-patch-to.html
http://www.kingview.com/news/detail.aspx?contentid=528
http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108
http://www.cert.org.cn/articles/bulletin/common/2011011325250.shtml
http://threatpost.com/en_us/blogs/china-cert-we-missed-report-scada-hole-011311
http://secunia.com/advisories/42851
http://en.wellintech.com/products/detail.aspx?contentid=25

Credit

This vulnerability was reported by Dillon Beresford of NSS Labs.

This document was written by Michael Orlando.

Other Information

Date Public:2011-01-09
Date First Published:2011-01-12
Date Last Updated:2011-01-18
CERT Advisory: 
CVE-ID(s):CVE-2011-0406
NVD-ID(s):CVE-2011-0406
US-CERT Technical Alerts: 
Severity Metric:91.20
Document Revision:30

Original Source

Url : http://www.kb.cert.org/vuls/id/180119

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
70366 WellinTech KingView HistorySvr.exe TCP Request Remote Overflow

KingView is prone to an overflow condition. The program fails to properly sanitize user-supplied input resulting in a heap overflow. With a specially crafted TCP request, a remote attacker can potentially cause arbitrary code execution.

Snort® IPS/IDS

Date Description
2014-01-10 CA Total Defense Suite UNCWS getDBConfigSettings credential information discl...
RuleID : 19812 - Revision : 10 - Type : SERVER-OTHER
2014-01-10 Kingview HMI heap overflow attempt
RuleID : 18327 - Revision : 9 - Type : PROTOCOL-SCADA