ID

VAR-201205-0302


CVE

CVE-2012-1824


TITLE

Measuresoft ScadaPro Client and ScadaPro Server Vulnerability gained in

Trust: 0.8

sources: JVNDB: JVNDB-2012-002564

DESCRIPTION

Untrusted search path vulnerability in Measuresoft ScadaPro Client before 4.0.0 and ScadaPro Server before 4.0.0 allows local users to gain privileges via a Trojan horse DLL in the current working directory. DLL It may be possible to get permission through the file. Measuresoft ScadaPro is a SCADA system for power, oil and gas, pharmaceutical and other companies. Measuresoft ScadaPro uses a fixed or controllable search path to discover resources, allowing unauthorized attackers to build malicious DLL files and loading malicious files before legitimate DLLs, which can cause arbitrary code to be executed in the context of the application. Measuresoft ScadaPro is prone to a vulnerability that lets attackers execute arbitrary code. An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file

Trust: 2.61

sources: NVD: CVE-2012-1824 // JVNDB: JVNDB-2012-002564 // CNVD: CNVD-2012-2775 // BID: 53681 // IVD: cefaa91a-2353-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: cefaa91a-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-2775

AFFECTED PRODUCTS

vendor:measuresoftmodel:scadapro clientscope:lteversion:3.3.1

Trust: 1.0

vendor:measuresoftmodel:scadapro serverscope:lteversion:3.3.1

Trust: 1.0

vendor:measuresoftmodel:scadaproscope:eqversion:4.0

Trust: 0.9

vendor:measuresoftmodel:scadapro clientscope:ltversion:4.0.0

Trust: 0.8

vendor:measuresoftmodel:scadapro serverscope:ltversion:4.0.0

Trust: 0.8

vendor:measuresoftmodel:scadapro serverscope:eqversion:3.3.1

Trust: 0.6

vendor:measuresoftmodel:scadapro clientscope:eqversion:3.3.1

Trust: 0.6

vendor:scadapro clientmodel: - scope:eqversion:*

Trust: 0.2

vendor:scadapro servermodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: cefaa91a-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-2775 // BID: 53681 // JVNDB: JVNDB-2012-002564 // CNNVD: CNNVD-201205-464 // NVD: CVE-2012-1824

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-1824
value: HIGH

Trust: 1.0

NVD: CVE-2012-1824
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201205-464
value: HIGH

Trust: 0.6

IVD: cefaa91a-2353-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2012-1824
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: cefaa91a-2353-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: cefaa91a-2353-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2012-002564 // CNNVD: CNNVD-201205-464 // NVD: CVE-2012-1824

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2012-002564 // NVD: CVE-2012-1824

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201205-464

TYPE

other

Trust: 0.8

sources: IVD: cefaa91a-2353-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201205-464

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002564

PATCH

title:scada-productsurl:http://www.measuresoft.com/products/scada-products.aspx

Trust: 0.8

title:Measuresoft ScadaPro DLL loads patches for arbitrary code execution vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/17351

Trust: 0.6

sources: CNVD: CNVD-2012-2775 // JVNDB: JVNDB-2012-002564

EXTERNAL IDS

db:NVDid:CVE-2012-1824

Trust: 3.5

db:ICS CERTid:ICSA-12-145-01

Trust: 3.3

db:BIDid:53681

Trust: 0.9

db:CNVDid:CNVD-2012-2775

Trust: 0.8

db:CNNVDid:CNNVD-201205-464

Trust: 0.8

db:JVNDBid:JVNDB-2012-002564

Trust: 0.8

db:IVDid:CEFAA91A-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: cefaa91a-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-2775 // BID: 53681 // JVNDB: JVNDB-2012-002564 // CNNVD: CNNVD-201205-464 // NVD: CVE-2012-1824

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-145-01.pdf

Trust: 2.7

url:http://www.measuresoft.net/downloads/measuresoft%20scada%204.4.6/issue_disks/server/documentation/releasenotes.doc

Trust: 1.6

url:http://www.measuresoft.net/downloads/measuresoft%20scada%204.4.6/issue_disks/client/documentation/releasenotes.doc

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1824

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1824

Trust: 0.8

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-145-01.pdfhttp

Trust: 0.6

url:http://www.securityfocus.com/bid/53681

Trust: 0.6

url:http://blog.rapid7.com/?p=5325

Trust: 0.3

url:http://blog.metasploit.com/2010/08/exploiting-dll-hijacking-flaws.html

Trust: 0.3

url:http://blogs.technet.com/b/msrc/archive/2010/08/21/microsoft-security-advisory-2269637-released.aspx

Trust: 0.3

url:http://blogs.technet.com/b/srd/archive/2010/08/23/more-information-about-dll-preloading-remote-attack-vector.aspx

Trust: 0.3

url:http://www.measuresoft.com/products/scada-products.aspx

Trust: 0.3

url:http://www.microsoft.com/technet/security/advisory/2269637.mspx

Trust: 0.3

sources: CNVD: CNVD-2012-2775 // BID: 53681 // JVNDB: JVNDB-2012-002564 // CNNVD: CNNVD-201205-464 // NVD: CVE-2012-1824

CREDITS

Carlos Mario Penagos Hollmann

Trust: 0.9

sources: BID: 53681 // CNNVD: CNNVD-201205-464

SOURCES

db:IVDid:cefaa91a-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-2775
db:BIDid:53681
db:JVNDBid:JVNDB-2012-002564
db:CNNVDid:CNNVD-201205-464
db:NVDid:CVE-2012-1824

LAST UPDATE DATE

2024-11-23T21:46:20.371000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-2775date:2012-05-28T00:00:00
db:BIDid:53681date:2012-05-24T00:00:00
db:JVNDBid:JVNDB-2012-002564date:2012-05-29T00:00:00
db:CNNVDid:CNNVD-201205-464date:2012-06-04T00:00:00
db:NVDid:CVE-2012-1824date:2024-11-21T01:37:51.060

SOURCES RELEASE DATE

db:IVDid:cefaa91a-2353-11e6-abef-000c29c66e3ddate:2012-05-28T00:00:00
db:CNVDid:CNVD-2012-2775date:2012-05-28T00:00:00
db:BIDid:53681date:2012-05-24T00:00:00
db:JVNDBid:JVNDB-2012-002564date:2012-05-29T00:00:00
db:CNNVDid:CNNVD-201205-464date:2012-05-28T00:00:00
db:NVDid:CVE-2012-1824date:2012-05-25T19:55:01.493