ID

VAR-E-201109-0020


CVE

cve_id:CVE-2011-3501

Trust: 1.9

cve_id:CVE-2011-3502

Trust: 0.3

cve_id:CVE-2011-3500

Trust: 0.3

cve_id:CVE-2011-3493

Trust: 0.3

sources: BID: 49610 // BID: 49611 // EXPLOIT-DB: 17839 // EDBNET: 40360

EDB ID

17839


TITLE

Cogent DataHub 7.1.1.63 - Integer Overflow - Windows dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 17839

DESCRIPTION

Cogent DataHub 7.1.1.63 - Integer Overflow. CVE-2011-3501CVE-75573 . dos exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 17839

AFFECTED PRODUCTS

vendor:cogentmodel:datahubscope:eqversion:7.1.1.63

Trust: 1.0

vendor:cogentmodel:real-time systems opc datahubscope:eqversion:6.0.2

Trust: 0.6

vendor:cogentmodel:real-time systems opc datahubscope:eqversion:6

Trust: 0.6

vendor:cogentmodel:real-time systems cogent datahubscope:eqversion:7.1.1.63

Trust: 0.6

vendor:cogentmodel:real-time systems cogent datahubscope:eqversion:7

Trust: 0.6

vendor:cogentmodel:real-time systems cascade datahubscope:eqversion:6

Trust: 0.6

vendor:cogentmodel:real-time systems opc datahubscope:neversion:6.4.20

Trust: 0.6

vendor:cogentmodel:real-time systems cogent datahubscope:neversion:7.1.2

Trust: 0.6

vendor:cogentmodel:real-time systems cascade datahubscope:neversion:6.4.20

Trust: 0.6

sources: BID: 49610 // BID: 49611 // EXPLOIT-DB: 17839

EXPLOIT

#######################################################################

Luigi Auriemma

Application: Cogent DataHub
http://www.cogentdatahub.com/Products/Cogent_DataHub.html
Versions: <= 7.1.1.63
Platforms: Windows
Bug: integer overflow
Exploitation: remote
Date: 13 Sep 2011
Author: Luigi Auriemma
e-mail: aluigi@autistici.org
web: aluigi.org

#######################################################################

1) Introduction
2) Bug
3) The Code
4) Fix

#######################################################################

===============
1) Introduction
===============

DataHub is a software for the SCADA and automation sector.

#######################################################################

======
2) Bug
======

The server/service listens on port 80 using a custom web server.

The software is affected by an integer overflow caused by the
allocation of the amount of memory specified by the Content-Length
field (-1 or 4294967295) plus one resulting in a buffer of zero bytes.

#######################################################################

===========
3) The Code
===========

http://aluigi.org/poc/cogent_3.dat
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17839.dat

nc SERVER 80 < cogent_3.dat

#######################################################################

======
4) Fix
======

No fix.

#######################################################################

Trust: 1.0

sources: EXPLOIT-DB: 17839

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 17839

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 17839

TYPE

Integer Overflow

Trust: 1.0

sources: EXPLOIT-DB: 17839

CREDITS

Luigi Auriemma

Trust: 0.6

sources: EXPLOIT-DB: 17839

EXTERNAL IDS

db:NVDid:CVE-2011-3501

Trust: 1.9

db:EXPLOIT-DBid:17839

Trust: 1.6

db:ICS CERTid:ICSA-11-280-01

Trust: 0.6

db:EDBNETid:40360

Trust: 0.6

db:NVDid:CVE-2011-3502

Trust: 0.3

db:NVDid:CVE-2011-3500

Trust: 0.3

db:BIDid:49610

Trust: 0.3

db:NVDid:CVE-2011-3493

Trust: 0.3

db:BIDid:49611

Trust: 0.3

sources: BID: 49610 // BID: 49611 // EXPLOIT-DB: 17839 // EDBNET: 40360

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2011-3501

Trust: 1.6

url:http://www.cogentdatahub.com/products/cogent_datahub.html

Trust: 0.6

url:http://www.us-cert.gov/control_systems/pdf/icsa-11-280-01.pdf

Trust: 0.6

url:https://www.exploit-db.com/exploits/17839/

Trust: 0.6

url:http://aluigi.org/mytoolz/mydown.zip

Trust: 0.3

url:http://aluigi.altervista.org/adv/cogent_1-adv.txt

Trust: 0.3

url:http://aluigi.altervista.org/adv/cogent_3-adv.txt

Trust: 0.3

url:http://aluigi.org/poc/cogent_3.dat

Trust: 0.3

url:http://aluigi.org/poc/cogent_1.dat

Trust: 0.3

sources: BID: 49610 // BID: 49611 // EXPLOIT-DB: 17839 // EDBNET: 40360

SOURCES

db:BIDid:49610
db:BIDid:49611
db:EXPLOIT-DBid:17839
db:EDBNETid:40360

LAST UPDATE DATE

2022-07-27T09:19:14.232000+00:00


SOURCES UPDATE DATE

db:BIDid:49610date:2011-10-11T16:20:00
db:BIDid:49611date:2015-03-19T08:47:00

SOURCES RELEASE DATE

db:BIDid:49610date:2011-09-13T00:00:00
db:BIDid:49611date:2011-09-13T00:00:00
db:EXPLOIT-DBid:17839date:2011-09-14T00:00:00
db:EDBNETid:40360date:2011-09-14T00:00:00