ID

VAR-201108-0128


CVE

CVE-2011-3143


TITLE

ClearSCADA Buffer Overflow Vulnerability

Trust: 0.8

sources: IVD: 27070a74-1f92-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-2309

DESCRIPTION

Use-after-free vulnerability in Control Microsystems ClearSCADA 2005, 2007, and 2009 before R2.3 and R1.4, as used in SCX before 67 R4.5 and 68 R3.9, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified long strings that trigger heap memory corruption. Control Microsystems is Schneider Electric, a global provider of SCADA hardware and software products. ClearSCADA is an integrated SCADA host platform that includes a rotation training engine, real-time database, web server, alarm processor and reporting software. There are several security vulnerabilities in ClearSCADA: 1. There is a heap-based buffer overflow for ClearSCADA applications, and a type heap overflow for overflow after release. Sending a legal message containing a very long string can trigger heap corruption. 2, ClearSCADA provides a WEB interface that supports HTTP and HTTPS. By default, the ClearSCADA server uses HTTP, which allows anyone to obtain plaintext authentication information by sniffing. 3. There is a reflective cross-site scripting attack on the WEB interface. With this vulnerability, an attacker can directly inject malicious code into a user's browser session. The parameter returned to the user is missing filtering. Attackers can exploit vulnerabilities for cross-site scripting attacks to obtain sensitive information or hijack user sessions. Control Microsystems ClearSCADA is prone to multiple remote vulnerabilities, including: 1. An information-disclosure vulnerability An attacker can exploit these issues to execute arbitrary code with elevated privileges, execute arbitrary script code within the context of the webserver, steal cookie-based authentication credentials, and gain access to sensitive information. Other attacks are also possible. The following products are affected: ClearSCADA 2005 ClearSCADA 2007 ClearSCADA 2009. ClearSCADA The application has a use error after release. ---------------------------------------------------------------------- Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei. Read more: http://conference.first.org/ ---------------------------------------------------------------------- TITLE: ClearSCADA Cross-Site Scripting and Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA44955 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44955/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44955 RELEASE DATE: 2011-06-16 DISCUSS ADVISORY: http://secunia.com/advisories/44955/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/44955/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=44955 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Two vulnerabilities have been reported in ClearSCADA, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. The vulnerabilities are reported the following products: * ClearSCADA 2005 (all versions) * ClearSCADA 2007 (all versions) * ClearSCADA 2009 (all versions except R2.3 and R1.4) SOLUTION: Update to a fixed version. Please see the CERT advisory for more information. PROVIDED AND/OR DISCOVERED BY: US-CERT credits Digital Bond. ORIGINAL ADVISORY: Digital Bond: http://www.digitalbond.com/scadapedia/vulnerability-notes/heap-overflow-vulnerability/ http://www.digitalbond.com/scadapedia/vulnerability-notes/control-microsystems-cross-site-scripting-vulnerability/ US-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-10-314-01A.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 4.41

sources: NVD: CVE-2011-3143 // JVNDB: JVNDB-2011-003495 // CNVD: CNVD-2011-2309 // CNVD: CNVD-2011-0506 // CNVD: CNVD-2011-2308 // BID: 46312 // IVD: ddb570c8-1f9f-11e6-abef-000c29c66e3d // IVD: 27070a74-1f92-11e6-abef-000c29c66e3d // IVD: 28d182c6-1f92-11e6-abef-000c29c66e3d // IVD: 7d7d7a14-463f-11e9-9e9f-000c29342cb1 // VULHUB: VHN-51088 // PACKETSTORM: 102344

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 2.6

sources: IVD: ddb570c8-1f9f-11e6-abef-000c29c66e3d // IVD: 27070a74-1f92-11e6-abef-000c29c66e3d // IVD: 28d182c6-1f92-11e6-abef-000c29c66e3d // IVD: 7d7d7a14-463f-11e9-9e9f-000c29342cb1 // CNVD: CNVD-2011-2309 // CNVD: CNVD-2011-0506 // CNVD: CNVD-2011-2308

AFFECTED PRODUCTS

vendor:clearscadamodel:clearscadascope:eqversion:2005/2007/2009

Trust: 1.2

vendor:schneider electricmodel:scx 67scope:ltversion:r4.5

Trust: 1.0

vendor:avevamodel:clearscadascope:eqversion:2007

Trust: 1.0

vendor:avevamodel:clearscadascope:eqversion:2009

Trust: 1.0

vendor:avevamodel:clearscadascope:eqversion:2005

Trust: 1.0

vendor:schneider electricmodel:scx 68scope:ltversion:r3.9

Trust: 1.0

vendor:control microsystemsmodel:clearscada 2005scope: - version: -

Trust: 0.8

vendor:control microsystemsmodel:clearscada 2007scope: - version: -

Trust: 0.8

vendor:control microsystemsmodel:clearscada 2009scope:ltversion:r1.4

Trust: 0.8

vendor:control microsystemsmodel:clearscada 2009scope:ltversion:r2.3

Trust: 0.8

vendor:serck controlmodel:scxscope:ltversion:67 r4.5

Trust: 0.8

vendor:serck controlmodel:scxscope:ltversion:68 r3.9

Trust: 0.8

vendor:controlmodel:microsystems clearscadascope:eqversion:2009

Trust: 0.6

vendor:controlmodel:microsystems clearscadascope:eqversion:2007

Trust: 0.6

vendor:controlmodel:microsystems clearscadascope:eqversion:2005

Trust: 0.6

vendor:schneider electricmodel:clearscada 2009scope:eqversion:r2.2

Trust: 0.6

vendor:schneider electricmodel:clearscada 2009scope:eqversion:r1.2

Trust: 0.6

vendor:schneider electricmodel:clearscada 2009scope:eqversion:r1.1

Trust: 0.6

vendor:schneider electricmodel:clearscada 2009scope:eqversion:r1.0

Trust: 0.6

vendor:schneider electricmodel:clearscada 2009scope:eqversion:r2.1

Trust: 0.6

vendor:schneider electricmodel:clearscada 2007scope:eqversion:r1.4

Trust: 0.6

vendor:serck controlsmodel:scxscope:eqversion:68

Trust: 0.6

vendor:schneider electricmodel:clearscada 2009scope:eqversion:r1.3

Trust: 0.6

vendor:serck controlsmodel:scxscope:eqversion:67

Trust: 0.6

vendor:schneider electricmodel:clearscada 2009scope:eqversion:r2.0

Trust: 0.6

vendor:clearscadamodel: - scope:eqversion:2005

Trust: 0.4

vendor:clearscadamodel: - scope:eqversion:2007

Trust: 0.4

vendor:clearscadamodel: - scope:eqversion:2009

Trust: 0.4

vendor:scx 67model: - scope:eqversion:*

Trust: 0.4

vendor:scx 68model: - scope:eqversion:*

Trust: 0.4

vendor:clearscadamodel: - scope:eqversion:*

Trust: 0.4

vendor:clearscadamodel: - scope:eqversion:2005/2007/2009

Trust: 0.4

vendor:controlmodel:microsystems clearscadascope:eqversion:20090

Trust: 0.3

vendor:controlmodel:microsystems clearscadascope:eqversion:20070

Trust: 0.3

vendor:controlmodel:microsystems clearscadascope:eqversion:20050

Trust: 0.3

vendor:controlmodel:microsystems clearscada r1.4scope:neversion:2010

Trust: 0.3

vendor:controlmodel:microsystems clearscadascope:neversion:20092.3

Trust: 0.3

vendor:controlmodel:microsystems clearscadascope:neversion:20091

Trust: 0.3

sources: IVD: ddb570c8-1f9f-11e6-abef-000c29c66e3d // IVD: 27070a74-1f92-11e6-abef-000c29c66e3d // IVD: 28d182c6-1f92-11e6-abef-000c29c66e3d // IVD: 7d7d7a14-463f-11e9-9e9f-000c29342cb1 // CNVD: CNVD-2011-2309 // CNVD: CNVD-2011-0506 // CNVD: CNVD-2011-2308 // BID: 46312 // JVNDB: JVNDB-2011-003495 // CNNVD: CNNVD-201108-286 // NVD: CVE-2011-3143

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3143
value: HIGH

Trust: 1.0

NVD: CVE-2011-3143
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201108-286
value: CRITICAL

Trust: 0.6

IVD: ddb570c8-1f9f-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 27070a74-1f92-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

IVD: 28d182c6-1f92-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: 7d7d7a14-463f-11e9-9e9f-000c29342cb1
value: CRITICAL

Trust: 0.2

VULHUB: VHN-51088
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-3143
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: ddb570c8-1f9f-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 27070a74-1f92-11e6-abef-000c29c66e3d
severity: NONE
baseScore: NONE
vectorString: NONE
accessVector: NONE
accessComplexity: NONE
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: UNKNOWN

Trust: 0.2

IVD: 28d182c6-1f92-11e6-abef-000c29c66e3d
severity: NONE
baseScore: NONE
vectorString: NONE
accessVector: NONE
accessComplexity: NONE
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: UNKNOWN

Trust: 0.2

IVD: 7d7d7a14-463f-11e9-9e9f-000c29342cb1
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-51088
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: ddb570c8-1f9f-11e6-abef-000c29c66e3d // IVD: 27070a74-1f92-11e6-abef-000c29c66e3d // IVD: 28d182c6-1f92-11e6-abef-000c29c66e3d // IVD: 7d7d7a14-463f-11e9-9e9f-000c29342cb1 // VULHUB: VHN-51088 // JVNDB: JVNDB-2011-003495 // CNNVD: CNNVD-201108-286 // NVD: CVE-2011-3143

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-51088 // JVNDB: JVNDB-2011-003495 // NVD: CVE-2011-3143

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201108-286

TYPE

Resource management error

Trust: 1.0

sources: IVD: ddb570c8-1f9f-11e6-abef-000c29c66e3d // IVD: 7d7d7a14-463f-11e9-9e9f-000c29342cb1 // CNNVD: CNNVD-201108-286

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-003495

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-51088

PATCH

title:Top Pageurl:http://www.clearscada.com/

Trust: 0.8

title:Top Pageurl:http://www.serck-controls.com/

Trust: 0.8

title:Patch for ClearSCADA Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/4144

Trust: 0.6

title:Control Microsystems ClearSCADA has multiple patches for security vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/2852

Trust: 0.6

title:Patch for ClearSCADA Cross-Site Scripting Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/4145

Trust: 0.6

sources: CNVD: CNVD-2011-2309 // CNVD: CNVD-2011-0506 // CNVD: CNVD-2011-2308 // JVNDB: JVNDB-2011-003495

EXTERNAL IDS

db:NVDid:CVE-2011-3143

Trust: 3.2

db:SECUNIAid:44955

Trust: 3.1

db:ICS CERTid:ICSA-10-314-01A

Trust: 2.6

db:ICS CERTid:ICSA-10-314-01

Trust: 2.5

db:BIDid:46312

Trust: 2.0

db:OSVDBid:72989

Trust: 1.7

db:CNNVDid:CNNVD-201108-286

Trust: 1.1

db:CNVDid:CNVD-2011-0506

Trust: 1.0

db:CNVDid:CNVD-2011-2309

Trust: 0.8

db:CNVDid:CNVD-2011-2308

Trust: 0.8

db:JVNDBid:JVNDB-2011-003495

Trust: 0.8

db:IVDid:DDB570C8-1F9F-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:27070A74-1F92-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:28D182C6-1F92-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:7D7D7A14-463F-11E9-9E9F-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-51088

Trust: 0.1

db:PACKETSTORMid:102344

Trust: 0.1

sources: IVD: ddb570c8-1f9f-11e6-abef-000c29c66e3d // IVD: 27070a74-1f92-11e6-abef-000c29c66e3d // IVD: 28d182c6-1f92-11e6-abef-000c29c66e3d // IVD: 7d7d7a14-463f-11e9-9e9f-000c29342cb1 // CNVD: CNVD-2011-2309 // CNVD: CNVD-2011-0506 // CNVD: CNVD-2011-2308 // VULHUB: VHN-51088 // BID: 46312 // JVNDB: JVNDB-2011-003495 // PACKETSTORM: 102344 // CNNVD: CNNVD-201108-286 // NVD: CVE-2011-3143

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-10-314-01a.pdf

Trust: 2.6

url:http://www.us-cert.gov/control_systems/pdf/icsa-10-314-01.pdf

Trust: 2.5

url:http://www.digitalbond.com/scadapedia/vulnerability-notes/heap-overflow-vulnerability/

Trust: 1.8

url:http://www.osvdb.org/72989

Trust: 1.7

url:http://secunia.com/advisories/44955

Trust: 1.7

url:http://secunia.com/advisories/44955/

Trust: 1.3

url:http://www.securityfocus.com/bid/46312

Trust: 1.1

url:http://www.vupen.com/english/reference-2011-0356-1.php

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3143

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3143

Trust: 0.8

url:http://www.clearscada.com/index.cfm

Trust: 0.3

url:http://www.clearscada.com/services-support/software-updates/

Trust: 0.3

url:http://www.digitalbond.com/scadapedia/vulnerability-notes/control-microsystems-cross-site-scripting-vulnerability/

Trust: 0.1

url:http://secunia.com/advisories/44955/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://conference.first.org/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=44955

Trust: 0.1

sources: CNVD: CNVD-2011-2309 // CNVD: CNVD-2011-0506 // CNVD: CNVD-2011-2308 // VULHUB: VHN-51088 // BID: 46312 // JVNDB: JVNDB-2011-003495 // PACKETSTORM: 102344 // CNNVD: CNNVD-201108-286 // NVD: CVE-2011-3143

CREDITS

Digital Bond

Trust: 0.3

sources: BID: 46312

SOURCES

db:IVDid:ddb570c8-1f9f-11e6-abef-000c29c66e3d
db:IVDid:27070a74-1f92-11e6-abef-000c29c66e3d
db:IVDid:28d182c6-1f92-11e6-abef-000c29c66e3d
db:IVDid:7d7d7a14-463f-11e9-9e9f-000c29342cb1
db:CNVDid:CNVD-2011-2309
db:CNVDid:CNVD-2011-0506
db:CNVDid:CNVD-2011-2308
db:VULHUBid:VHN-51088
db:BIDid:46312
db:JVNDBid:JVNDB-2011-003495
db:PACKETSTORMid:102344
db:CNNVDid:CNNVD-201108-286
db:NVDid:CVE-2011-3143

LAST UPDATE DATE

2025-04-11T22:56:26.501000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-2309date:2011-06-17T00:00:00
db:CNVDid:CNVD-2011-0506date:2011-02-11T00:00:00
db:CNVDid:CNVD-2011-2308date:2011-06-17T00:00:00
db:VULHUBid:VHN-51088date:2018-12-31T00:00:00
db:BIDid:46312date:2015-07-15T00:13:00
db:JVNDBid:JVNDB-2011-003495date:2011-12-22T00:00:00
db:CNNVDid:CNNVD-201108-286date:2011-08-17T00:00:00
db:NVDid:CVE-2011-3143date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:ddb570c8-1f9f-11e6-abef-000c29c66e3ddate:2011-02-11T00:00:00
db:IVDid:27070a74-1f92-11e6-abef-000c29c66e3ddate:2011-06-17T00:00:00
db:IVDid:28d182c6-1f92-11e6-abef-000c29c66e3ddate:2011-06-17T00:00:00
db:IVDid:7d7d7a14-463f-11e9-9e9f-000c29342cb1date:2011-02-11T00:00:00
db:CNVDid:CNVD-2011-2309date:2011-06-17T00:00:00
db:CNVDid:CNVD-2011-0506date:2011-02-11T00:00:00
db:CNVDid:CNVD-2011-2308date:2011-06-17T00:00:00
db:VULHUBid:VHN-51088date:2011-08-16T00:00:00
db:BIDid:46312date:2011-02-10T00:00:00
db:JVNDBid:JVNDB-2011-003495date:2011-12-22T00:00:00
db:PACKETSTORMid:102344date:2011-06-16T10:28:00
db:CNNVDid:CNNVD-201108-286date:2011-08-17T00:00:00
db:NVDid:CVE-2011-3143date:2011-08-16T21:55:01.350