ID

VAR-201204-0095


CVE

CVE-2011-4044


TITLE

plural ARC Informatique Product ActiveX Control file modification vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2011-005029

DESCRIPTION

An unspecified ActiveX control in SVUIGrd.ocx in ARC Informatique PcVue 6.0 through 10.0, FrontVue, and PlantVue allows remote attackers to modify files via calls to unknown methods. PcVue is a data acquisition control system software from ARC Informatique. There is a security hole in the PcVue control. You can write dword to any memory location through the GetExtendedColor method in SVUIGrd.ocx. The Save/LoadObject method in the SVUIGrd.ocx control is used directly as a function pointer, and there is an arbitrary code execution vulnerability. The Save/LoadObject method in SVUIGrd.ocx can be used to destroy local files. The aipgctl.ocx DeletePage method has an array overflow problem. The Arc Informatique \"SaveObject()\" method (SVUIGrd.ocx) has an error that can be exploited to overwrite any file with a directory traversal sequence. The PcVue ActiveX control is prone to multiple vulnerabilities. Failed exploit attempts may result in a denial-of-service condition. PcVue 10.0 is vulnerable; other versions may also be affected. ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Arc Informatique Products Multiple ActiveX Controls Vulnerabilities SECUNIA ADVISORY ID: SA47131 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47131/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47131 RELEASE DATE: 2011-12-07 DISCUSS ADVISORY: http://secunia.com/advisories/47131/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47131/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47131 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in multiple Arc Informatique products, which can be exploited by malicious people to manipulate certain data and compromise a user's system. 1) An error when handling the "SaveObject()" and "LoadObject()" methods (SVUIGrd.ocx) can be exploited to perform a virtual function call into an arbitrary memory location via a specially crafted "aStream" argument. The vulnerabilities are reported in the following versions: * PcVue versions 6.x, 7.x, 8.x, 9.x, and 10.x. SOLUTION: Update to a fixed version. Contact the vendor for details. PROVIDED AND/OR DISCOVERED BY: 1 - 4) Luigi Auriemma 2) ICS-CERT credits Kuang-Chun Hung, Security Research and Service Institute Information and Communication Security Technology Center (ICST) ORIGINAL ADVISORY: Luigi: http://aluigi.altervista.org/adv/pcvue_1-adv.txt ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-11-340-01.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 4.86

sources: NVD: CVE-2011-4044 // JVNDB: JVNDB-2011-005029 // CNVD: CNVD-2011-3894 // CNVD: CNVD-2011-3890 // CNVD: CNVD-2011-3897 // CNVD: CNVD-2011-3898 // CNVD: CNVD-2011-5212 // BID: 49795 // IVD: f94fe7e8-2353-11e6-abef-000c29c66e3d // PACKETSTORM: 107615

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 3.2

sources: IVD: f94fe7e8-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3894 // CNVD: CNVD-2011-3890 // CNVD: CNVD-2011-3897 // CNVD: CNVD-2011-3898 // CNVD: CNVD-2011-5212

AFFECTED PRODUCTS

vendor:arcmodel:informatique pcvuescope:eqversion:10.0

Trust: 2.7

vendor:arcinfomodel:pcvuescope:eqversion:10.0

Trust: 1.6

vendor:arcinfomodel:pcvuescope:eqversion:6.0

Trust: 1.6

vendor:arcinfomodel:pcvuescope:eqversion:9.0

Trust: 1.6

vendor:arcinfomodel:pcvuescope:eqversion:8.2

Trust: 1.6

vendor:arcinfomodel:plantvuescope:eqversion: -

Trust: 1.6

vendor:arcinfomodel:frontvuescope:eqversion: -

Trust: 1.6

vendor:arc informatiquemodel:frontvuescope: - version: -

Trust: 0.8

vendor:arc informatiquemodel:pcvuescope:eqversion:6.0 to 10.0

Trust: 0.8

vendor:arc informatiquemodel:plantvuescope: - version: -

Trust: 0.8

vendor:arcmodel:informatique frontvuescope: - version: -

Trust: 0.6

vendor:arcmodel:informatique pcvuescope:eqversion:6.x

Trust: 0.6

vendor:arcmodel:informatique pcvuescope:eqversion:7.x

Trust: 0.6

vendor:arcmodel:informatique pcvuescope:eqversion:8.x

Trust: 0.6

vendor:arcmodel:informatique pcvuescope:eqversion:9.x

Trust: 0.6

vendor:arcmodel:informatique pcvuescope:eqversion:10.x

Trust: 0.6

vendor:arcmodel:informatique plantvuescope: - version: -

Trust: 0.6

vendor:arcmodel:informatique plantvuescope:eqversion:0

Trust: 0.3

vendor:arcmodel:informatique pcvuescope:eqversion:6

Trust: 0.3

vendor:arcmodel:informatique frontvuescope:eqversion:0

Trust: 0.3

vendor:frontvuemodel: - scope:eqversion: -

Trust: 0.2

vendor:pcvuemodel: - scope:eqversion:6.0

Trust: 0.2

vendor:pcvuemodel: - scope:eqversion:8.2

Trust: 0.2

vendor:pcvuemodel: - scope:eqversion:9.0

Trust: 0.2

vendor:pcvuemodel: - scope:eqversion:10.0

Trust: 0.2

vendor:plantvuemodel: - scope:eqversion: -

Trust: 0.2

sources: IVD: f94fe7e8-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3894 // CNVD: CNVD-2011-3890 // CNVD: CNVD-2011-3897 // CNVD: CNVD-2011-3898 // CNVD: CNVD-2011-5212 // BID: 49795 // JVNDB: JVNDB-2011-005029 // CNNVD: CNNVD-201112-101 // NVD: CVE-2011-4044

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-4044
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-4044
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201112-101
value: MEDIUM

Trust: 0.6

IVD: f94fe7e8-2353-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2011-4044
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: f94fe7e8-2353-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: f94fe7e8-2353-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2011-005029 // CNNVD: CNNVD-201112-101 // NVD: CVE-2011-4044

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2011-4044

THREAT TYPE

remote

Trust: 1.2

sources: CNNVD: CNNVD-201109-579 // CNNVD: CNNVD-201112-101

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201112-101

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-005029

PATCH

title:Security Alertsurl:http://www.pcvuesolutions.com/index.php?option=com_content&view=article&id=244&Itemid=257

Trust: 0.8

title:Top Pageurl:http://www.pcvuesolutions.com/index.php?option=com_content&view=frontpage&Itemid=9&lang=ja

Trust: 0.8

title:Patch for Arc Informatique Product ActiveX Control Vulnerability (CNVD-2011-5212)url:https://www.cnvd.org.cn/patchInfo/show/6194

Trust: 0.6

sources: CNVD: CNVD-2011-5212 // JVNDB: JVNDB-2011-005029

EXTERNAL IDS

db:NVDid:CVE-2011-4044

Trust: 3.5

db:BIDid:49795

Trust: 3.3

db:ICS CERTid:ICSA-11-340-01

Trust: 2.8

db:SECUNIAid:47131

Trust: 1.4

db:CNVDid:CNVD-2011-5212

Trust: 0.8

db:CNNVDid:CNNVD-201112-101

Trust: 0.8

db:ICS CERT ALERTid:ICS-ALERT-11-271-01

Trust: 0.8

db:JVNDBid:JVNDB-2011-005029

Trust: 0.8

db:CNVDid:CNVD-2011-3894

Trust: 0.6

db:CNVDid:CNVD-2011-3890

Trust: 0.6

db:CNVDid:CNVD-2011-3897

Trust: 0.6

db:CNVDid:CNVD-2011-3898

Trust: 0.6

db:CNNVDid:CNNVD-201109-579

Trust: 0.6

db:NSFOCUSid:18354

Trust: 0.6

db:IVDid:F94FE7E8-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:107615

Trust: 0.1

sources: IVD: f94fe7e8-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-3894 // CNVD: CNVD-2011-3890 // CNVD: CNVD-2011-3897 // CNVD: CNVD-2011-3898 // CNVD: CNVD-2011-5212 // BID: 49795 // JVNDB: JVNDB-2011-005029 // PACKETSTORM: 107615 // CNNVD: CNNVD-201109-579 // CNNVD: CNNVD-201112-101 // NVD: CVE-2011-4044

REFERENCES

url:http://aluigi.altervista.org/adv/pcvue_1-adv.txt

Trust: 2.8

url:http://www.us-cert.gov/control_systems/pdf/icsa-11-340-01.pdf

Trust: 2.8

url:https://support.pcvuescada.com/index.php?option=com_k2&view=item&id=512&itemid=440

Trust: 1.6

url:http://www.pcvuesolutions.com/index.php?option=com_content&view=article&id=244&itemid=257

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4044

Trust: 0.8

url:http://www.us-cert.gov/control_systems/pdf/ics-alert-11-271-01.pdf

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4044

Trust: 0.8

url:http://secunia.com/advisories/47131/

Trust: 0.7

url:http://www.securityfocus.com/bid/49795

Trust: 0.6

url:http://secunia.com/advisories/47131

Trust: 0.6

url:http://www.nsfocus.net/vulndb/18354

Trust: 0.6

url:http://support.microsoft.com/kb/240797

Trust: 0.3

url:http://www.arcinfo.com/index.php?option=com_content&id=2&itemid=151

Trust: 0.3

url:http://secunia.com/advisories/47131/#comments

Trust: 0.1

url:http://secunia.com/company/jobs/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47131

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2011-3894 // CNVD: CNVD-2011-3890 // CNVD: CNVD-2011-3897 // CNVD: CNVD-2011-3898 // CNVD: CNVD-2011-5212 // BID: 49795 // JVNDB: JVNDB-2011-005029 // PACKETSTORM: 107615 // CNNVD: CNNVD-201109-579 // CNNVD: CNNVD-201112-101 // NVD: CVE-2011-4044

CREDITS

Luigi Auriemma

Trust: 0.9

sources: BID: 49795 // CNNVD: CNNVD-201109-579

SOURCES

db:IVDid:f94fe7e8-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2011-3894
db:CNVDid:CNVD-2011-3890
db:CNVDid:CNVD-2011-3897
db:CNVDid:CNVD-2011-3898
db:CNVDid:CNVD-2011-5212
db:BIDid:49795
db:JVNDBid:JVNDB-2011-005029
db:PACKETSTORMid:107615
db:CNNVDid:CNNVD-201109-579
db:CNNVDid:CNNVD-201112-101
db:NVDid:CVE-2011-4044

LAST UPDATE DATE

2024-08-14T14:34:34.042000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-3894date:2011-09-28T00:00:00
db:CNVDid:CNVD-2011-3890date:2011-09-28T00:00:00
db:CNVDid:CNVD-2011-3897date:2011-09-28T00:00:00
db:CNVDid:CNVD-2011-3898date:2011-09-28T00:00:00
db:CNVDid:CNVD-2011-5212date:2011-12-09T00:00:00
db:BIDid:49795date:2011-12-06T22:07:00
db:JVNDBid:JVNDB-2011-005029date:2012-04-04T00:00:00
db:CNNVDid:CNNVD-201109-579date:2011-09-29T00:00:00
db:CNNVDid:CNNVD-201112-101date:2011-12-09T00:00:00
db:NVDid:CVE-2011-4044date:2012-04-03T04:00:00

SOURCES RELEASE DATE

db:IVDid:f94fe7e8-2353-11e6-abef-000c29c66e3ddate:2011-12-09T00:00:00
db:CNVDid:CNVD-2011-3894date:2011-09-28T00:00:00
db:CNVDid:CNVD-2011-3890date:2011-09-28T00:00:00
db:CNVDid:CNVD-2011-3897date:2011-09-28T00:00:00
db:CNVDid:CNVD-2011-3898date:2011-09-28T00:00:00
db:CNVDid:CNVD-2011-5212date:2011-12-09T00:00:00
db:BIDid:49795date:2011-09-27T00:00:00
db:JVNDBid:JVNDB-2011-005029date:2012-04-04T00:00:00
db:PACKETSTORMid:107615date:2011-12-07T07:51:44
db:CNNVDid:CNNVD-201109-579date:1900-01-01T00:00:00
db:CNNVDid:CNNVD-201112-101date:2011-12-09T00:00:00
db:NVDid:CVE-2011-4044date:2012-04-03T03:44:36.023