ID

VAR-201101-0383


CVE

CVE-2011-0488


TITLE

InduSoft NTWebServer Web Service Stack-Based Buffer Overflow Vulnerability

Trust: 1.3

sources: IVD: 7d738f01-463f-11e9-a408-000c29342cb1 // IVD: 5696d59c-1fa3-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-0144 // BID: 45783

DESCRIPTION

Stack-based buffer overflow in NTWebServer.exe in the test web service in InduSoft NTWebServer, as distributed in Advantech Studio 6.1 and InduSoft Web Studio 7.0, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long request to TCP port 80. Advantech Studio Test Web Server Contains a buffer overflow vulnerability. Indusoft is a powerful interpersonal interface graphical design software (SCADA) developed by indusoft. InduSoft NTWebServer runs the test WEB service on TCP port 80. Successful exploitation of the vulnerability can be performed in the context of the service process. Code. InduSoft NTWebServer is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the affected server. Successful attacks will compromise the server and possibly the underlying computer. Failed attacks will likely cause denial-of-service conditions. SOLUTION: Apply patch. ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). Request a free trial: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: InduSoft Web Studio NTWebServer Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA42883 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/42883/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=42883 RELEASE DATE: 2011-01-13 DISCUSS ADVISORY: http://secunia.com/advisories/42883/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/42883/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=42883 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in InduSoft Web Studio, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is reported in version 7.0. Other versions may also be affected. SOLUTION: Restrict access to trusted hosts only. Use a different web server. PROVIDED AND/OR DISCOVERED BY: US-CERT credits Jeremy Brown. ORIGINAL ADVISORY: InduSoft: http://www.indusoft.com/blog/?p=337 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.96

sources: NVD: CVE-2011-0488 // CERT/CC: VU#506864 // JVNDB: JVNDB-2011-001027 // CNVD: CNVD-2011-0144 // BID: 45783 // IVD: 7d738f01-463f-11e9-a408-000c29342cb1 // IVD: 6e076d62-2355-11e6-abef-000c29c66e3d // IVD: 5696d59c-1fa3-11e6-abef-000c29c66e3d // VULHUB: VHN-48433 // PACKETSTORM: 97511 // PACKETSTORM: 97510

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.2

sources: IVD: 7d738f01-463f-11e9-a408-000c29342cb1 // IVD: 6e076d62-2355-11e6-abef-000c29c66e3d // IVD: 5696d59c-1fa3-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-0144

AFFECTED PRODUCTS

vendor:indusoftmodel:web studioscope:eqversion:7.0

Trust: 1.6

vendor:advantechmodel:studioscope:eqversion:6.1

Trust: 1.0

vendor:advantechmodel: - scope: - version: -

Trust: 0.8

vendor:indusoftmodel: - scope: - version: -

Trust: 0.8

vendor:advantechmodel:studioscope:lteversion:version 6.1

Trust: 0.8

vendor:advantech studiomodel: - scope:eqversion:6.1

Trust: 0.6

vendor:web studiomodel: - scope:eqversion:7.0

Trust: 0.6

vendor:indusoftmodel:ntwebserverscope: - version: -

Trust: 0.6

vendor:indusoftmodel:web studioscope:eqversion:6.1

Trust: 0.3

vendor:advantechmodel:indusoftscope:eqversion:6.1

Trust: 0.3

sources: IVD: 7d738f01-463f-11e9-a408-000c29342cb1 // IVD: 6e076d62-2355-11e6-abef-000c29c66e3d // IVD: 5696d59c-1fa3-11e6-abef-000c29c66e3d // CERT/CC: VU#506864 // CNVD: CNVD-2011-0144 // BID: 45783 // JVNDB: JVNDB-2011-001027 // CNNVD: CNNVD-201101-206 // NVD: CVE-2011-0488

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-0488
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#506864
value: 71.28

Trust: 0.8

NVD: CVE-2011-0488
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201101-206
value: CRITICAL

Trust: 0.6

IVD: 7d738f01-463f-11e9-a408-000c29342cb1
value: CRITICAL

Trust: 0.2

IVD: 6e076d62-2355-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 5696d59c-1fa3-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

VULHUB: VHN-48433
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-0488
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 7d738f01-463f-11e9-a408-000c29342cb1
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 6e076d62-2355-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 5696d59c-1fa3-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-48433
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 7d738f01-463f-11e9-a408-000c29342cb1 // IVD: 6e076d62-2355-11e6-abef-000c29c66e3d // IVD: 5696d59c-1fa3-11e6-abef-000c29c66e3d // CERT/CC: VU#506864 // VULHUB: VHN-48433 // JVNDB: JVNDB-2011-001027 // CNNVD: CNNVD-201101-206 // NVD: CVE-2011-0488

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-48433 // JVNDB: JVNDB-2011-001027 // NVD: CVE-2011-0488

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201101-206

TYPE

Buffer overflow

Trust: 1.2

sources: IVD: 7d738f01-463f-11e9-a408-000c29342cb1 // IVD: 6e076d62-2355-11e6-abef-000c29c66e3d // IVD: 5696d59c-1fa3-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201101-206

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-001027

PATCH

title:Advantech Studio Test Web Server Buffer Overflowurl:http://www.advantechdirect.com/emarketingprograms/AStudio_Patch/AStudio_Patch.htm

Trust: 0.8

title:パートナー情報url:http://www.advantech.co.jp/support-AJP/distributors.asp

Trust: 0.8

title:Top Pageurl:http://www.advantech.co.jp/

Trust: 0.8

title:NTWebServerurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=37113

Trust: 0.6

sources: JVNDB: JVNDB-2011-001027 // CNNVD: CNNVD-201101-206

EXTERNAL IDS

db:CERT/CCid:VU#506864

Trust: 4.2

db:NVDid:CVE-2011-0488

Trust: 3.4

db:ICS CERTid:ICSA-10-337-01

Trust: 3.3

db:BIDid:45783

Trust: 2.6

db:SECUNIAid:42883

Trust: 2.6

db:SECUNIAid:42903

Trust: 2.6

db:VUPENid:ADV-2011-0092

Trust: 2.5

db:VUPENid:ADV-2011-0093

Trust: 2.5

db:OSVDBid:70396

Trust: 2.5

db:XFid:64678

Trust: 1.4

db:CNNVDid:CNNVD-201101-206

Trust: 1.3

db:CNVDid:CNVD-2011-0144

Trust: 1.0

db:JVNDBid:JVNDB-2011-001027

Trust: 0.8

db:NSFOCUSid:17588

Trust: 0.6

db:ICS CERT ALERTid:ICS-ALERT-11-230-01

Trust: 0.3

db:IVDid:7D738F01-463F-11E9-A408-000C29342CB1

Trust: 0.2

db:IVDid:6E076D62-2355-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:5696D59C-1FA3-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-48433

Trust: 0.1

db:PACKETSTORMid:97511

Trust: 0.1

db:PACKETSTORMid:97510

Trust: 0.1

sources: IVD: 7d738f01-463f-11e9-a408-000c29342cb1 // IVD: 6e076d62-2355-11e6-abef-000c29c66e3d // IVD: 5696d59c-1fa3-11e6-abef-000c29c66e3d // CERT/CC: VU#506864 // CNVD: CNVD-2011-0144 // VULHUB: VHN-48433 // BID: 45783 // JVNDB: JVNDB-2011-001027 // PACKETSTORM: 97511 // PACKETSTORM: 97510 // CNNVD: CNNVD-201101-206 // NVD: CVE-2011-0488

REFERENCES

url:http://www.kb.cert.org/vuls/id/506864

Trust: 3.4

url:http://www.us-cert.gov/control_systems/pdf/icsa-10-337-01.pdf

Trust: 3.3

url:http://www.indusoft.com/blog/?p=337

Trust: 2.6

url:http://www.osvdb.org/70396

Trust: 2.5

url:http://secunia.com/advisories/42883

Trust: 2.5

url:http://secunia.com/advisories/42903

Trust: 2.5

url:http://www.vupen.com/english/advisories/2011/0092

Trust: 2.5

url:http://www.vupen.com/english/advisories/2011/0093

Trust: 2.5

url:http://www.securityfocus.com/bid/45783

Trust: 1.7

url:http://downloadt.advantech.com/download/downloadsr.aspx?file_id=1-i1d7qd

Trust: 1.7

url:http://www.advantechdirect.com/emarketingprograms/astudio_patch/astudio_patch.htm

Trust: 1.7

url:http://xforce.iss.net/xforce/xfdb/64678

Trust: 1.4

url:http://www.indusoft.com/mainpage.php?aricleid=17&type=certified/hardware

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/64678

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0488

Trust: 0.8

url:http://jvn.jp/cert/jvnvu506864

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0488

Trust: 0.8

url:http://www.nsfocus.net/vulndb/17588

Trust: 0.6

url:http://www.us-cert.gov/control_systems/pdf/ics-alert-11-230-01.pdf

Trust: 0.3

url:http://secunia.com/products/corporate/evm/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/products/corporate/vim/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://support.advantech.com.tw/support/downloadsrdetail.aspx?sr_id=1-i1b0td&doc_source=download

Trust: 0.1

url:http://secunia.com/advisories/42903/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=42903

Trust: 0.1

url:http://secunia.com/advisories/42903/

Trust: 0.1

url:http://secunia.com/advisories/42883/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=42883

Trust: 0.1

url:http://secunia.com/advisories/42883/

Trust: 0.1

sources: CERT/CC: VU#506864 // CNVD: CNVD-2011-0144 // VULHUB: VHN-48433 // BID: 45783 // JVNDB: JVNDB-2011-001027 // PACKETSTORM: 97511 // PACKETSTORM: 97510 // CNNVD: CNNVD-201101-206 // NVD: CVE-2011-0488

CREDITS

Jeremy Brown

Trust: 0.9

sources: BID: 45783 // CNNVD: CNNVD-201101-206

SOURCES

db:IVDid:7d738f01-463f-11e9-a408-000c29342cb1
db:IVDid:6e076d62-2355-11e6-abef-000c29c66e3d
db:IVDid:5696d59c-1fa3-11e6-abef-000c29c66e3d
db:CERT/CCid:VU#506864
db:CNVDid:CNVD-2011-0144
db:VULHUBid:VHN-48433
db:BIDid:45783
db:JVNDBid:JVNDB-2011-001027
db:PACKETSTORMid:97511
db:PACKETSTORMid:97510
db:CNNVDid:CNNVD-201101-206
db:NVDid:CVE-2011-0488

LAST UPDATE DATE

2025-04-11T22:59:26.897000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#506864date:2011-01-12T00:00:00
db:CNVDid:CNVD-2011-0144date:2011-01-13T00:00:00
db:VULHUBid:VHN-48433date:2017-08-17T00:00:00
db:BIDid:45783date:2011-08-19T17:10:00
db:JVNDBid:JVNDB-2011-001027date:2011-02-02T00:00:00
db:CNNVDid:CNNVD-201101-206date:2011-01-19T00:00:00
db:NVDid:CVE-2011-0488date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:7d738f01-463f-11e9-a408-000c29342cb1date:2011-01-13T00:00:00
db:IVDid:6e076d62-2355-11e6-abef-000c29c66e3ddate:2011-01-19T00:00:00
db:IVDid:5696d59c-1fa3-11e6-abef-000c29c66e3ddate:2011-01-13T00:00:00
db:CERT/CCid:VU#506864date:2011-01-12T00:00:00
db:CNVDid:CNVD-2011-0144date:2011-01-13T00:00:00
db:VULHUBid:VHN-48433date:2011-01-18T00:00:00
db:BIDid:45783date:2011-01-12T00:00:00
db:JVNDBid:JVNDB-2011-001027date:2011-02-02T00:00:00
db:PACKETSTORMid:97511date:2011-01-13T05:05:56
db:PACKETSTORMid:97510date:2011-01-13T05:05:54
db:CNNVDid:CNNVD-201101-206date:2011-01-19T00:00:00
db:NVDid:CVE-2011-0488date:2011-01-18T18:03:09.033