ID

VAR-201109-0120


CVE

CVE-2011-3391


TITLE

Siemens SIMATIC WinCC Flexible Tag Simulator Remote Memory Corruption Vulnerability

Trust: 0.9

sources: BID: 49405 // CNNVD: CNNVD-201108-546

DESCRIPTION

IBM Rational Build Forge 7.1.2 relies on client-side JavaScript code to enforce the EditSecurity permission requirement for the Export Key File function, which allows remote authenticated users to read a key file by removing a disable attribute in the Security sub-menu. IBM Rational Build Forge is an automated process execution software that helps customers build, test and publish automated software. An information disclosure vulnerability exists in IBM Rational Build Forge that could allow an attacker to exploit sensitive information. Siemens SIMATIC WinCC is a multi-user system that provides complete monitoring and data acquisition (SCADA) functionality for the industrial sector, from single-user systems to redundant server and remote web client solutions. A memory corruption vulnerability exists in Siemens SIMATIC WinCC Flexible. Due to an unspecified error in the tag emulator, an attacker can cause memory corruption by opening a specially crafted file, and the exploit can successfully execute arbitrary code. Remote attackers can exploit this issue to gain access to sensitive information that may aid in further attacks. Failed exploit attempts will likely result in denial-of-service conditions. The following versions are affected: The following products are affected: ProTool 6.0 SP3 WinCC flexible 2004 WinCC flexible 2005 WinCC flexible 2005 SP1 WinCC flexible 2007 WinCC flexible 2008 WinCC flexible 2008 SP1 WinCC flexible 2008 SP2. Successful exploitation of the vulnerability can execute arbitrary code. ---------------------------------------------------------------------- The Secunia CSI 5.0 Beta - now available for testing Find out more, take a free test drive, and share your opinion with us: http://secunia.com/blog/242 ---------------------------------------------------------------------- TITLE: Siemens SIMATIC WinCC Flexible Tag Simulator Memory Corruption Vulnerability SECUNIA ADVISORY ID: SA45770 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/45770/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=45770 RELEASE DATE: 2011-09-01 DISCUSS ADVISORY: http://secunia.com/advisories/45770/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/45770/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=45770 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Siemens SIMATIC WinCC Flexible, which can be exploited by malicious people to compromise a user's system. The vulnerability are reported in versions 2005 SP1, 2007, 2008, 2008 SP1, and 2008 SP2. SOLUTION: Apply patches. Please see vendor's advisory for details. PROVIDED AND/OR DISCOVERED BY: Billy Rios and Terry McCorkle via ICS-CERT. ORIGINAL ADVISORY: Siemens: http://support.automation.siemens.com/WW/llisapi.dll?func=cslib.csinfo&lang=en&objid=50182361 ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-11-175-02.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . The security issue is caused due to the web application not checking the "EditSecurity" permissions when performing certain actions. This can be exploited to e.g. export a key file from the security sub-menu

Trust: 3.78

sources: NVD: CVE-2011-3391 // JVNDB: JVNDB-2011-004889 // CNVD: CNVD-2011-3458 // CNVD: CNVD-2011-3471 // BID: 49407 // BID: 49405 // IVD: 5119408c-1f8a-11e6-abef-000c29c66e3d // IVD: 00233f5c-1f8a-11e6-abef-000c29c66e3d // PACKETSTORM: 104678 // PACKETSTORM: 104679

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.6

sources: IVD: 5119408c-1f8a-11e6-abef-000c29c66e3d // IVD: 00233f5c-1f8a-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3458 // CNVD: CNVD-2011-3471

AFFECTED PRODUCTS

vendor:ibmmodel:rational build forgescope:eqversion:7.1.2

Trust: 2.4

vendor:siemensmodel:simatic wincc flexiblescope:eqversion:2005

Trust: 1.1

vendor:ibmmodel:rational build forgescope:eqversion:7.0

Trust: 0.9

vendor:ibmmodel:rational build forgescope:eqversion:7.0.2

Trust: 0.9

vendor:ibmmodel:rational build forgescope:eqversion:7.1.0

Trust: 0.9

vendor:siemensmodel:protool sp3scope:eqversion:6.0

Trust: 0.9

vendor:siemensmodel:simatic wincc flexible sp2scope:eqversion:2008

Trust: 0.9

vendor:siemensmodel:simatic wincc flexible sp1scope:eqversion:2008

Trust: 0.9

vendor:siemensmodel:simatic wincc flexiblescope:eqversion:2008

Trust: 0.9

vendor:siemensmodel:simatic wincc flexiblescope:eqversion:2007

Trust: 0.9

vendor:siemensmodel:simatic wincc flexible sp1scope:eqversion:2005

Trust: 0.9

vendor:siemensmodel:simatic wincc flexiblescope:eqversion:2004

Trust: 0.3

vendor:siemensmodel:protool sp3scope:eqversion:6.0*

Trust: 0.2

vendor:siemensmodel:simatic wincc flexible sp2scope:eqversion:2008*

Trust: 0.2

vendor:siemensmodel:simatic wincc flexible sp1scope:eqversion:2008*

Trust: 0.2

vendor:siemensmodel:simatic wincc flexiblescope:eqversion:2008*

Trust: 0.2

vendor:siemensmodel:simatic wincc flexiblescope:eqversion:2007*

Trust: 0.2

vendor:siemensmodel:simatic wincc flexible sp1scope:eqversion:2005*

Trust: 0.2

vendor:rational forgemodel: - scope:eqversion:7.1.2

Trust: 0.2

sources: IVD: 5119408c-1f8a-11e6-abef-000c29c66e3d // IVD: 00233f5c-1f8a-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3458 // CNVD: CNVD-2011-3471 // BID: 49407 // BID: 49405 // JVNDB: JVNDB-2011-004889 // CNNVD: CNNVD-201109-083 // NVD: CVE-2011-3391

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3391
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-3391
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201109-083
value: MEDIUM

Trust: 0.6

IVD: 5119408c-1f8a-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

IVD: 00233f5c-1f8a-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2011-3391
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 5119408c-1f8a-11e6-abef-000c29c66e3d
severity: NONE
baseScore: NONE
vectorString: NONE
accessVector: NONE
accessComplexity: NONE
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: UNKNOWN

Trust: 0.2

IVD: 00233f5c-1f8a-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 5119408c-1f8a-11e6-abef-000c29c66e3d // IVD: 00233f5c-1f8a-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2011-004889 // CNNVD: CNNVD-201109-083 // NVD: CVE-2011-3391

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.8

sources: JVNDB: JVNDB-2011-004889 // NVD: CVE-2011-3391

THREAT TYPE

remote

Trust: 1.8

sources: CNNVD: CNNVD-201108-546 // CNNVD: CNNVD-201108-549 // CNNVD: CNNVD-201109-083

TYPE

Resource management error

Trust: 0.8

sources: IVD: 5119408c-1f8a-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201108-546

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-004889

PATCH

title:PM38058url:http://www.ibm.com/support/docview.wss?uid=swg1PM38058

Trust: 0.8

title:IBM Rational Build Forge 'EditSecurity' patch for information disclosure vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/4969

Trust: 0.6

title:Patch for Siemens SIMATIC WinCC Flexible Tag Simulator Memory Corruption Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/4976

Trust: 0.6

sources: CNVD: CNVD-2011-3458 // CNVD: CNVD-2011-3471 // JVNDB: JVNDB-2011-004889

EXTERNAL IDS

db:BIDid:49407

Trust: 3.1

db:NVDid:CVE-2011-3391

Trust: 2.9

db:SECUNIAid:45871

Trust: 1.7

db:OSVDBid:74831

Trust: 1.6

db:SECTRACKid:1026004

Trust: 1.6

db:BIDid:49405

Trust: 1.5

db:CNVDid:CNVD-2011-3471

Trust: 0.8

db:CNVDid:CNVD-2011-3458

Trust: 0.8

db:CNNVDid:CNNVD-201109-083

Trust: 0.8

db:JVNDBid:JVNDB-2011-004889

Trust: 0.8

db:ICS CERTid:ICSA-11-175-02

Trust: 0.7

db:CNNVDid:CNNVD-201108-546

Trust: 0.6

db:CNNVDid:CNNVD-201108-549

Trust: 0.6

db:XFid:69522

Trust: 0.6

db:AIXAPARid:PM38058

Trust: 0.6

db:IVDid:5119408C-1F8A-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:00233F5C-1F8A-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:SECUNIAid:45770

Trust: 0.2

db:PACKETSTORMid:104678

Trust: 0.1

db:PACKETSTORMid:104679

Trust: 0.1

sources: IVD: 5119408c-1f8a-11e6-abef-000c29c66e3d // IVD: 00233f5c-1f8a-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3458 // CNVD: CNVD-2011-3471 // BID: 49407 // BID: 49405 // JVNDB: JVNDB-2011-004889 // PACKETSTORM: 104678 // PACKETSTORM: 104679 // CNNVD: CNNVD-201108-546 // CNNVD: CNNVD-201108-549 // CNNVD: CNNVD-201109-083 // NVD: CVE-2011-3391

REFERENCES

url:http://www.securityfocus.com/bid/49407

Trust: 2.8

url:http://www.ibm.com/support/docview.wss?uid=swg1pm38058

Trust: 1.7

url:http://www.osvdb.org/74831

Trust: 1.6

url:http://securitytracker.com/id?1026004

Trust: 1.6

url:http://secunia.com/advisories/45871

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/69522

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3391

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3391

Trust: 0.8

url:http://www.us-cert.gov/control_systems/pdf/icsa-11-175-02.pdf

Trust: 0.7

url:http://www.securityfocus.com/bid/49405http

Trust: 0.6

url:http://www.securityfocus.com/bid/49405

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/69522

Trust: 0.6

url:http://support.automation.siemens.com/ww/llisapi.dll?func=cslib.csinfo&lang=en&objid=50182361

Trust: 0.4

url:http://www.ibm.com

Trust: 0.3

url:http://secunia.com/blog/242

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=45770

Trust: 0.1

url:http://secunia.com/advisories/45770/#comments

Trust: 0.1

url:http://secunia.com/advisories/45770/

Trust: 0.1

url:http://secunia.com/advisories/45871/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=45871

Trust: 0.1

url:http://secunia.com/advisories/45871/#comments

Trust: 0.1

sources: CNVD: CNVD-2011-3458 // CNVD: CNVD-2011-3471 // BID: 49407 // BID: 49405 // JVNDB: JVNDB-2011-004889 // PACKETSTORM: 104678 // PACKETSTORM: 104679 // CNNVD: CNNVD-201108-546 // CNNVD: CNNVD-201108-549 // CNNVD: CNNVD-201109-083 // NVD: CVE-2011-3391

CREDITS

IBM

Trust: 0.9

sources: BID: 49407 // CNNVD: CNNVD-201108-549

SOURCES

db:IVDid:5119408c-1f8a-11e6-abef-000c29c66e3d
db:IVDid:00233f5c-1f8a-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2011-3458
db:CNVDid:CNVD-2011-3471
db:BIDid:49407
db:BIDid:49405
db:JVNDBid:JVNDB-2011-004889
db:PACKETSTORMid:104678
db:PACKETSTORMid:104679
db:CNNVDid:CNNVD-201108-546
db:CNNVDid:CNNVD-201108-549
db:CNNVDid:CNNVD-201109-083
db:NVDid:CVE-2011-3391

LAST UPDATE DATE

2024-08-14T13:36:47.283000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-3458date:2011-09-02T00:00:00
db:CNVDid:CNVD-2011-3471date:2011-09-02T00:00:00
db:BIDid:49407date:2015-03-19T07:35:00
db:BIDid:49405date:2011-09-01T00:00:00
db:JVNDBid:JVNDB-2011-004889date:2012-03-27T00:00:00
db:CNNVDid:CNNVD-201108-546date:2011-09-05T00:00:00
db:CNNVDid:CNNVD-201108-549date:2011-09-05T00:00:00
db:CNNVDid:CNNVD-201109-083date:2011-09-09T00:00:00
db:NVDid:CVE-2011-3391date:2017-08-29T01:30:11.427

SOURCES RELEASE DATE

db:IVDid:5119408c-1f8a-11e6-abef-000c29c66e3ddate:2011-09-02T00:00:00
db:IVDid:00233f5c-1f8a-11e6-abef-000c29c66e3ddate:2011-09-02T00:00:00
db:CNVDid:CNVD-2011-3458date:2011-09-02T00:00:00
db:CNVDid:CNVD-2011-3471date:2011-09-02T00:00:00
db:BIDid:49407date:2011-09-01T00:00:00
db:BIDid:49405date:2011-09-01T00:00:00
db:JVNDBid:JVNDB-2011-004889date:2012-03-27T00:00:00
db:PACKETSTORMid:104678date:2011-09-01T12:46:24
db:PACKETSTORMid:104679date:2011-09-01T12:46:27
db:CNNVDid:CNNVD-201108-546date:1900-01-01T00:00:00
db:CNNVDid:CNNVD-201108-549date:1900-01-01T00:00:00
db:CNNVDid:CNNVD-201109-083date:2011-09-09T00:00:00
db:NVDid:CVE-2011-3391date:2011-09-08T18:55:05.707