Executive Summary
Summary | |
---|---|
Title | InduSoft NTWebServer web service stack-based buffer overflow |
Informations | |||
---|---|---|---|
Name | VU#506864 | First vendor Publication | 2011-01-12 |
Vendor | VU-CERT | Last vendor Modification | 2011-01-12 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#506864InduSoft NTWebServer web service stack-based buffer overflowOverviewInduSoft NTWebServer web service contains a stack-based buffer overflow vulnerability.I. DescriptionAccording to InduSoft's website: "InduSoft Web Studio™ is a powerful collection of automation tools that provide all the automation building blocks to develop HMIs, SCADA systems and embedded instrumentation solutions. Utilize InduSoft integrated Web technologies to take advantage of Internet/intranet connectivity." InduSoft NTWebServer runs a test web service on port 80/tcp. InduSoft NTWebServer test web service is vulnerable to a stack-based buffer overflow when more than 2048 bytes are written to the fixed-size stack buffer causing the test web service to write past the bounds of the buffer and corrupt the memory.II. ImpactAn attacker can cause the service to crash and may be able to execute arbitrary code.III. SolutionUse IISInduSoft recommends using NTWebServer test web service only for development purposes and Microsoft IIS for production.
Referenceshttp://www.us-cert.gov/control_systems/pdf/ICSA-10-337-01.pdf Thanks to Jeremy Brown for reporting this vulnerability to ICS-CERT. This document was written by Michael Orlando.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/506864 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
70396 | NTWebServer NTWebServer.exe HTTP Request Remote Overflow NTWebServer is prone to an overflow condition. The program fails to properly sanitize user-supplied input resulting in a stack-based buffer overflow. With a specially crafted string greater than 2048 bytes, a remote attacker can potentially execute arbitrary code. |