ID

VAR-201109-0169


CVE

CVE-2011-3497


TITLE

Measuresoft ScadaPro service.exe Information Disclosure Vulnerability

Trust: 0.8

sources: IVD: a44e1b2e-2354-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201109-270

DESCRIPTION

service.exe in Measuresoft ScadaPro 4.0.0 and earlier allows remote attackers to execute arbitrary DLL functions via the XF function, possibly related to an insecure exposed method. Measuresoft ScadaPro of service.exe Any DLL There is a vulnerability that is executed.By a third party XF Through any DLL There is a vulnerability that is executed. Service.exe has multiple boundary errors when processing messages, and sending a specially crafted command to TCP port 11234 can trigger a stack-based buffer overflow. Measuresoft ScadaPro provides integrated data phone, monitoring, logging, report generation and more. Measuresoft ScadaPro has a security vulnerability. The \"xF\" command can be used to call any function in any DLL, such as executing the application via the \"system()\" function in msvcrt.dll. Measuresoft ScadaPro has a security vulnerability and sends a special \"RF\" command to TCP port 11234 to get arbitrary file content. Exploiting these issues could allow remote attackers to perform unauthorized actions using directory traversal strings or to execute arbitrary code or commands within the context of the affected application. Failed attempts will likely cause denial-of-service conditions

Trust: 4.77

sources: NVD: CVE-2011-3497 // JVNDB: JVNDB-2011-002234 // CNVD: CNVD-2011-3670 // CNVD: CNVD-2011-3674 // CNVD: CNVD-2011-3676 // CNVD: CNVD-2011-3675 // CNVD: CNVD-2011-3673 // BID: 49613 // IVD: a44e1b2e-2354-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 3.2

sources: IVD: a44e1b2e-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3670 // CNVD: CNVD-2011-3674 // CNVD: CNVD-2011-3676 // CNVD: CNVD-2011-3675 // CNVD: CNVD-2011-3673

AFFECTED PRODUCTS

vendor:easuresoftmodel:scadaproscope:eqversion:4.0.0.0

Trust: 3.0

vendor:measuresoftmodel:scadaproscope:lteversion:4.0.0

Trust: 1.8

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.11

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.10

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.13

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.15

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.12

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.9

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.6

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.14

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.8

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.7

Trust: 1.6

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.4

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.4

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.6.0

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.2.8

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.1

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.3

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.4.2

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.5.2

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.5.5

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.7.0

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.5.4

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.5.1

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.0

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.5

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.5.3

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.4.1

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.7.1

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.4.4

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.4.5

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.8.0

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.9.0

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.5

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.3.2

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.2.9

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.9.2

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.3

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.4.3

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.3.1

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.1.0

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.2

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.7.2

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.4.6

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:3.3.0

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:2.1

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:4.0

Trust: 0.3

vendor:measuresoftmodel:scadaproscope:eqversion:0

Trust: 0.3

vendor:measuresoftmodel:scadaproscope:neversion:4.0.1

Trust: 0.3

vendor:scadapromodel: - scope:eqversion:2.1

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.2

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.3

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.4

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.4.1

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.4.2

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.4.3

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.4.4

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.4.5

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.4.6

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.5

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.5.1

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.5.2

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.5.3

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.5.4

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.5.5

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.6.0

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.7.0

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.7.1

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.7.2

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.8.0

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:2.9.0

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.1.0

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.2.8

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.2.9

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.3.0

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.3.1

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.3.2

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.0

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.1

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.2

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.3

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.4

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.5

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.6

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.7

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.8

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.9

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.10

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.11

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.12

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.13

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.14

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:3.9.15

Trust: 0.2

vendor:scadapromodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: a44e1b2e-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3670 // CNVD: CNVD-2011-3674 // CNVD: CNVD-2011-3676 // CNVD: CNVD-2011-3675 // CNVD: CNVD-2011-3673 // BID: 49613 // JVNDB: JVNDB-2011-002234 // CNNVD: CNNVD-201109-270 // NVD: CVE-2011-3497

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3497
value: HIGH

Trust: 1.0

NVD: CVE-2011-3497
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201109-270
value: CRITICAL

Trust: 0.6

IVD: a44e1b2e-2354-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2011-3497
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: a44e1b2e-2354-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: a44e1b2e-2354-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2011-002234 // CNNVD: CNNVD-201109-270 // NVD: CVE-2011-3497

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.8

sources: JVNDB: JVNDB-2011-002234 // NVD: CVE-2011-3497

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201109-270

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201109-270

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002234

PATCH

title:scada-productsurl:http://www.measuresoft.com/products/scada-products.aspx

Trust: 0.8

sources: JVNDB: JVNDB-2011-002234

EXTERNAL IDS

db:BIDid:49613

Trust: 4.1

db:NVDid:CVE-2011-3497

Trust: 2.9

db:ICS CERT ALERTid:ICS-ALERT-11-256-04

Trust: 2.4

db:SREASONid:8382

Trust: 1.0

db:CNNVDid:CNNVD-201109-270

Trust: 0.8

db:OSVDBid:75490

Trust: 0.8

db:JVNDBid:JVNDB-2011-002234

Trust: 0.8

db:CNVDid:CNVD-2011-3670

Trust: 0.6

db:CNVDid:CNVD-2011-3674

Trust: 0.6

db:CNVDid:CNVD-2011-3676

Trust: 0.6

db:CNVDid:CNVD-2011-3675

Trust: 0.6

db:CNVDid:CNVD-2011-3673

Trust: 0.6

db:ICS CERTid:ICSA-11-263-01

Trust: 0.3

db:IVDid:A44E1B2E-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: a44e1b2e-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3670 // CNVD: CNVD-2011-3674 // CNVD: CNVD-2011-3676 // CNVD: CNVD-2011-3675 // CNVD: CNVD-2011-3673 // BID: 49613 // JVNDB: JVNDB-2011-002234 // CNNVD: CNNVD-201109-270 // NVD: CVE-2011-3497

REFERENCES

url:http://aluigi.altervista.org/adv/scadapro_1-adv.txthttp

Trust: 3.0

url:http://www.us-cert.gov/control_systems/pdf/ics-alert-11-256-04.pdf

Trust: 2.4

url:http://aluigi.altervista.org/adv/scadapro_1-adv.txt

Trust: 1.9

url:http://securityreason.com/securityalert/8382

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3497

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3497

Trust: 0.8

url:http://osvdb.org/75490

Trust: 0.8

url:http://www.securityfocus.com/bid/49613

Trust: 0.8

url:http://www.measuresoft.com/products/scada-products.aspx

Trust: 0.3

url:/archive/1/519637

Trust: 0.3

url:http://www.us-cert.gov/control_systems/pdf/icsa-11-263-01.pdf

Trust: 0.3

url:http://www.measuresoft.net/news/post/inaccurate-reports-of-measuresoft-scadapro-400-vulnerability.aspx

Trust: 0.3

sources: CNVD: CNVD-2011-3670 // CNVD: CNVD-2011-3674 // CNVD: CNVD-2011-3676 // CNVD: CNVD-2011-3675 // CNVD: CNVD-2011-3673 // BID: 49613 // JVNDB: JVNDB-2011-002234 // CNNVD: CNNVD-201109-270 // NVD: CVE-2011-3497

CREDITS

Luigi Auriemma

Trust: 0.3

sources: BID: 49613

SOURCES

db:IVDid:a44e1b2e-2354-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2011-3670
db:CNVDid:CNVD-2011-3674
db:CNVDid:CNVD-2011-3676
db:CNVDid:CNVD-2011-3675
db:CNVDid:CNVD-2011-3673
db:BIDid:49613
db:JVNDBid:JVNDB-2011-002234
db:CNNVDid:CNNVD-201109-270
db:NVDid:CVE-2011-3497

LAST UPDATE DATE

2024-08-14T14:52:48.920000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-3670date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3674date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3676date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3675date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3673date:2011-09-15T00:00:00
db:BIDid:49613date:2011-09-20T21:30:00
db:JVNDBid:JVNDB-2011-002234date:2011-09-26T00:00:00
db:CNNVDid:CNNVD-201109-270date:2011-09-19T00:00:00
db:NVDid:CVE-2011-3497date:2012-02-14T04:08:47.617

SOURCES RELEASE DATE

db:IVDid:a44e1b2e-2354-11e6-abef-000c29c66e3ddate:2011-09-19T00:00:00
db:CNVDid:CNVD-2011-3670date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3674date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3676date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3675date:2011-09-15T00:00:00
db:CNVDid:CNVD-2011-3673date:2011-09-15T00:00:00
db:BIDid:49613date:2011-09-13T00:00:00
db:JVNDBid:JVNDB-2011-002234date:2011-09-26T00:00:00
db:CNNVDid:CNNVD-201109-270date:2011-09-19T00:00:00
db:NVDid:CVE-2011-3497date:2011-09-16T17:26:14.777