ID
VAR-E-201109-0022
CVE
cve_id: | CVE-2011-3493 | Trust: 1.9 |
cve_id: | CVE-2011-3502 | Trust: 0.3 |
cve_id: | CVE-2011-3500 | Trust: 0.3 |
cve_id: | CVE-2011-3501 | Trust: 0.3 |
EDB ID
17838
TITLE
Cogent DataHub 7.1.1.63 - Stack Overflow - Windows dos Exploit
Trust: 0.6
DESCRIPTION
Cogent DataHub 7.1.1.63 - Stack Overflow. CVE-2011-3493CVE-75570 . dos exploit for Windows platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | cogent | model: | datahub | scope: | eq | version: | 7.1.1.63 | Trust: 1.0 |
vendor: | cogent | model: | real-time systems opc datahub | scope: | eq | version: | 6.0.2 | Trust: 0.6 |
vendor: | cogent | model: | real-time systems opc datahub | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | cogent | model: | real-time systems cogent datahub | scope: | eq | version: | 7.1.1.63 | Trust: 0.6 |
vendor: | cogent | model: | real-time systems cogent datahub | scope: | eq | version: | 7 | Trust: 0.6 |
vendor: | cogent | model: | real-time systems cascade datahub | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | cogent | model: | real-time systems opc datahub | scope: | ne | version: | 6.4.20 | Trust: 0.6 |
vendor: | cogent | model: | real-time systems cogent datahub | scope: | ne | version: | 7.1.2 | Trust: 0.6 |
vendor: | cogent | model: | real-time systems cascade datahub | scope: | ne | version: | 6.4.20 | Trust: 0.6 |
vendor: | cogent | model: | datahub | scope: | lte | version: | <=7.1.1.63 | Trust: 0.6 |
EXPLOIT
#######################################################################
Luigi Auriemma
Application: Cogent DataHub
http://www.cogentdatahub.com/Products/Cogent_DataHub.html
Versions: <= 7.1.1.63
Platforms: Windows
Bug: stack unicode overflow
Exploitation: remote
Date: 13 Sep 2011
Author: Luigi Auriemma
e-mail: aluigi@autistici.org
web: aluigi.org
#######################################################################
1) Introduction
2) Bug
3) The Code
4) Fix
#######################################################################
===============
1) Introduction
===============
DataHub is a software for the SCADA and automation sector.
#######################################################################
======
2) Bug
======
The server/service listens on the ports 4052 and 4053, the only
difference is that the second port uses SSL while the first one is in
plain-text.
Stack-based unicode buffer-overflow in the "DH_OneSecondTick" function
exploitable through the "domain", "report_domain", "register_datahub",
"slave" and some other commands:
00440442 |. 50 |PUSH EAX ; string
00440443 |. 68 64854900 |PUSH CogentDa.00498564 ; "Domain"
00440448 |. 8D8D 00FFFFFF |LEA ECX,DWORD PTR SS:[EBP-100]
0044044E |. 68 A42F4900 |PUSH CogentDa.00492FA4 ; "%s.%s"
00440453 |. 51 |PUSH ECX ; stack buffer
00440454 |. FF15 B4F44800 |CALL DWORD PTR DS:[<&MSVCR90._swprintf>]
#######################################################################
===========
3) The Code
===========
http://aluigi.org/poc/cogent_1.dat
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17838.dat
nc SERVER 4052 < cogent_1.dat
port 4053 uses the same protocol via SSL.
#######################################################################
======
4) Fix
======
No fix.
#######################################################################
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Stack Overflow
Trust: 1.6
CREDITS
Luigi Auriemma
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2011-3493 | Trust: 1.9 |
db: | EXPLOIT-DB | id: | 17838 | Trust: 1.6 |
db: | ICS CERT | id: | ICSA-11-280-01 | Trust: 0.6 |
db: | EDBNET | id: | 40359 | Trust: 0.6 |
db: | NVD | id: | CVE-2011-3502 | Trust: 0.3 |
db: | NVD | id: | CVE-2011-3500 | Trust: 0.3 |
db: | BID | id: | 49610 | Trust: 0.3 |
db: | NVD | id: | CVE-2011-3501 | Trust: 0.3 |
db: | BID | id: | 49611 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2011-3493 | Trust: 1.6 |
url: | http://www.cogentdatahub.com/products/cogent_datahub.html | Trust: 0.6 |
url: | http://www.us-cert.gov/control_systems/pdf/icsa-11-280-01.pdf | Trust: 0.6 |
url: | https://www.exploit-db.com/exploits/17838/ | Trust: 0.6 |
url: | http://aluigi.org/mytoolz/mydown.zip | Trust: 0.3 |
url: | http://aluigi.altervista.org/adv/cogent_1-adv.txt | Trust: 0.3 |
url: | http://aluigi.altervista.org/adv/cogent_3-adv.txt | Trust: 0.3 |
url: | http://aluigi.org/poc/cogent_3.dat | Trust: 0.3 |
url: | http://aluigi.org/poc/cogent_1.dat | Trust: 0.3 |
SOURCES
db: | BID | id: | 49610 |
db: | BID | id: | 49611 |
db: | EXPLOIT-DB | id: | 17838 |
db: | EDBNET | id: | 40359 |
LAST UPDATE DATE
2022-07-27T09:19:14.205000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 49610 | date: | 2011-10-11T16:20:00 |
db: | BID | id: | 49611 | date: | 2015-03-19T08:47:00 |
SOURCES RELEASE DATE
db: | BID | id: | 49610 | date: | 2011-09-13T00:00:00 |
db: | BID | id: | 49611 | date: | 2011-09-13T00:00:00 |
db: | EXPLOIT-DB | id: | 17838 | date: | 2011-09-14T00:00:00 |
db: | EDBNET | id: | 40359 | date: | 2011-09-14T00:00:00 |