ID

VAR-201209-0581


CVE

CVE-2011-5163


TITLE

CitectSCADA and Mitsubishi MX4 SCADA Buffer Overflow Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2011-5807 // CNNVD: CNNVD-201111-254

DESCRIPTION

Buffer overflow in an unspecified third-party component in the Batch module for Schneider Electric CitectSCADA before 7.20 and Mitsubishi MX4 SCADA before 7.20 allows local users to execute arbitrary code via a long string in a login sequence. CitectSCADA is software for providing monitoring and control functions in the Data Acquisition and Monitoring System (SCADA). A buffer overflow vulnerability exists in CitectSCADA and Mitsubishi MX4 SCADA version 7.10. This vulnerability affects the Batch server module, which can be exploited by an attacker to run arbitrary code in the context of an application, and a failed attack attempt will result in a denial of service. CitectSCADA is an industrial control software used by Mitsubishi MX4 and Schneider Electric. Careful construction of string data can execute arbitrary code in the application context. CitectSCADA and Mitsubishi MX4 SCADA are prone to a buffer-overflow vulnerability that affects the Batch server module. Failed exploit attempts will result in a denial-of-service condition. The following versions are vulnerable: CitectSCADA 7.10 and prior Mitsubishi MX4 SCADA 7.10 and prior. Citectscada is prone to a local security vulnerability. ---------------------------------------------------------------------- Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool. Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/ ---------------------------------------------------------------------- TITLE: Schneider Electric CitectSCADA Batch Server Login Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA46779 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46779/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46779 RELEASE DATE: 2011-11-09 DISCUSS ADVISORY: http://secunia.com/advisories/46779/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/46779/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=46779 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Schneider Electric CitectSCADA, which can be exploited by malicious people to compromise a vulnerable system. Successful exploitation may allow execution of arbitrary code. SOLUTION: Update to a fixed version. Please contact the vendor for details. PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Kuang-Chun Hung, Taiwan\x92s Information and Communication Security Technology Center (ICST). ORIGINAL ADVISORY: CitectSCADA: http://www.citect.com/citectscada-batch ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-02.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . The application bundles a vulnerable version of CitectSCADA

Trust: 4.05

sources: NVD: CVE-2011-5163 // JVNDB: JVNDB-2011-005156 // CNVD: CNVD-2011-5807 // CNVD: CNVD-2011-4804 // BID: 50604 // BID: 77854 // IVD: 5faca590-2353-11e6-abef-000c29c66e3d // IVD: b0d03a04-1f7f-11e6-abef-000c29c66e3d // IVD: 65ae310c-1f7f-11e6-abef-000c29c66e3d // VULHUB: VHN-53108 // PACKETSTORM: 106802 // PACKETSTORM: 106806

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.8

sources: IVD: 5faca590-2353-11e6-abef-000c29c66e3d // IVD: b0d03a04-1f7f-11e6-abef-000c29c66e3d // IVD: 65ae310c-1f7f-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-5807 // CNVD: CNVD-2011-4804

AFFECTED PRODUCTS

vendor:schneider electricmodel:citectscadascope:lteversion:7.10

Trust: 1.0

vendor:mitsubishi automationmodel:mx4 scadascope:lteversion:7.10

Trust: 1.0

vendor:mitsubishi automationmodel:mx4 scadascope:eqversion:7.10

Trust: 0.9

vendor:schneidermodel:electric citectscadascope:eqversion:7.1

Trust: 0.8

vendor:schneider electricmodel:citectscadascope:ltversion:7.20

Trust: 0.8

vendor:mitsubishi electricmodel:mx4 scadascope:ltversion:7.20

Trust: 0.8

vendor:citectmodel:citectscadascope:eqversion:7.x

Trust: 0.6

vendor:schneidermodel:electric citectscadascope:eqversion:7.10

Trust: 0.3

vendor:mitsubishimodel:electric mx4 scadascope:eqversion:7.10

Trust: 0.3

vendor:schneider electricmodel:citectscadascope:eqversion:7.10

Trust: 0.3

vendor:mx4 scadamodel: - scope:eqversion:*

Trust: 0.2

vendor:citectscadamodel: - scope:eqversion:*

Trust: 0.2

vendor:citectmodel: - scope:eqversion:*

Trust: 0.2

vendor:citectscadamodel: - scope:eqversion:7.x

Trust: 0.2

sources: IVD: 5faca590-2353-11e6-abef-000c29c66e3d // IVD: b0d03a04-1f7f-11e6-abef-000c29c66e3d // IVD: 65ae310c-1f7f-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-5807 // CNVD: CNVD-2011-4804 // BID: 50604 // BID: 77854 // JVNDB: JVNDB-2011-005156 // CNNVD: CNNVD-201209-330 // NVD: CVE-2011-5163

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-5163
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-5163
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2011-5807
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201209-330
value: MEDIUM

Trust: 0.6

IVD: 5faca590-2353-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: b0d03a04-1f7f-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: 65ae310c-1f7f-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

VULHUB: VHN-53108
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-5163
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2011-5807
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:M/AU:N/C:C/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 5faca590-2353-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: b0d03a04-1f7f-11e6-abef-000c29c66e3d
severity: NONE
baseScore: NONE
vectorString: NONE
accessVector: NONE
accessComplexity: NONE
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: UNKNOWN

Trust: 0.2

IVD: 65ae310c-1f7f-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:M/AU:N/C:C/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-53108
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 5faca590-2353-11e6-abef-000c29c66e3d // IVD: b0d03a04-1f7f-11e6-abef-000c29c66e3d // IVD: 65ae310c-1f7f-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-5807 // VULHUB: VHN-53108 // JVNDB: JVNDB-2011-005156 // CNNVD: CNNVD-201209-330 // NVD: CVE-2011-5163

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-53108 // JVNDB: JVNDB-2011-005156 // NVD: CVE-2011-5163

THREAT TYPE

local

Trust: 0.9

sources: BID: 77854 // CNNVD: CNNVD-201209-330

TYPE

Buffer overflow

Trust: 1.8

sources: IVD: 5faca590-2353-11e6-abef-000c29c66e3d // IVD: b0d03a04-1f7f-11e6-abef-000c29c66e3d // IVD: 65ae310c-1f7f-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201111-254 // CNNVD: CNNVD-201209-330

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-005156

PATCH

title:CitectScada V7.20 Service Pack 3url:http://www.downloads.schneider-electric.com/sites/oreo/ww/document-detail.page?p_docId=4660520&p_Conf=i#http://www.downloads.schneider-electric.com

Trust: 0.8

title:Top Pageurl:http://www.schneider-electric.com/site/home/index.cfm/ww/

Trust: 0.8

title:γ‚΅γƒγƒΌγƒˆurl:http://www.schneider-electric.co.jp/sites/japan/jp/support/contact/we-care.page

Trust: 0.8

title:Mitsubishi MX4 SCADAurl:http://www.mitsubishi-automation.com/products/software_MX4_content.htm

Trust: 0.8

title:Product Safety Noticeurl:https://my.mitsubishi-automation.com/downloads_show.php?portal_id=1&doc_type=safety&scat=2&sstr=MX4,SCADA

Trust: 0.8

title:Top Pageurl:http://www.schneider-electric.com/site/home/index.cfm/jp/

Trust: 0.8

title:Patch for CitectSCADA and Mitsubishi MX4 SCADA Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/36929

Trust: 0.6

title:Patch for Schneider Electric/Mitsubishi MX4 CitectSCADA Batch Server Login Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/5857

Trust: 0.6

sources: CNVD: CNVD-2011-5807 // CNVD: CNVD-2011-4804 // JVNDB: JVNDB-2011-005156

EXTERNAL IDS

db:ICS CERTid:ICSA-11-279-02

Trust: 3.9

db:NVDid:CVE-2011-5163

Trust: 3.0

db:SECUNIAid:46779

Trust: 2.5

db:SECTRACKid:1026306

Trust: 2.0

db:SECUNIAid:46786

Trust: 1.9

db:OSVDBid:76937

Trust: 1.7

db:BIDid:50604

Trust: 1.5

db:CNNVDid:CNNVD-201209-330

Trust: 0.9

db:CNVDid:CNVD-2011-4804

Trust: 0.8

db:CNVDid:CNVD-2011-5807

Trust: 0.8

db:JVNDBid:JVNDB-2011-005156

Trust: 0.8

db:CNNVDid:CNNVD-201111-254

Trust: 0.6

db:BIDid:77854

Trust: 0.4

db:IVDid:5FACA590-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:B0D03A04-1F7F-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:65AE310C-1F7F-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-53108

Trust: 0.1

db:PACKETSTORMid:106802

Trust: 0.1

db:PACKETSTORMid:106806

Trust: 0.1

sources: IVD: 5faca590-2353-11e6-abef-000c29c66e3d // IVD: b0d03a04-1f7f-11e6-abef-000c29c66e3d // IVD: 65ae310c-1f7f-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-5807 // CNVD: CNVD-2011-4804 // VULHUB: VHN-53108 // BID: 50604 // BID: 77854 // JVNDB: JVNDB-2011-005156 // PACKETSTORM: 106802 // PACKETSTORM: 106806 // CNNVD: CNNVD-201111-254 // CNNVD: CNNVD-201209-330 // NVD: CVE-2011-5163

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-11-279-02.pdf

Trust: 3.3

url:http://www.citect.com/citectscada-batch

Trust: 2.1

url:http://www.securitytracker.com/id?1026306

Trust: 2.0

url:http://www.osvdb.org/76937

Trust: 1.7

url:http://secunia.com/advisories/46779

Trust: 1.7

url:http://secunia.com/advisories/46786

Trust: 1.7

url:http://www.securityfocus.com/bid/50604

Trust: 1.2

url:https://my.mitsubishi-automation.com/downloads_show.php?portal_id=1&doc_type=safety&scat=2&sstr=mx4%2cscada

Trust: 1.0

url:https://my.mitsubishi-automation.com/downloads_show.php?portal_id=1&doc_type=safety&scat=2&sstr=mx4,scada

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-5163

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-5163

Trust: 0.8

url:http://www.us-cert.gov/control_systems/pdf/icsa-11-279-02.pdfhttp

Trust: 0.6

url:http://www.citect.com/

Trust: 0.3

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/products/corporate/vim/ovum_2011_request/

Trust: 0.2

url:https://my.mitsubishi-automation.com/downloads_show.php?portal_id=1&doc_type=safety&scat=2&sstr=mx4,scada

Trust: 0.1

url:http://secunia.com/advisories/46779/

Trust: 0.1

url:http://secunia.com/advisories/46779/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46779

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46786

Trust: 0.1

url:http://secunia.com/advisories/46786/#comments

Trust: 0.1

url:https://my.mitsubishi-automation.com/downloads/view/doc_loc/8879/91516012-eb50-11e0-98c9-0022195266d5_psn2011-0001a.pdf

Trust: 0.1

url:http://secunia.com/advisories/46786/

Trust: 0.1

sources: CNVD: CNVD-2011-5807 // CNVD: CNVD-2011-4804 // VULHUB: VHN-53108 // BID: 50604 // BID: 77854 // JVNDB: JVNDB-2011-005156 // PACKETSTORM: 106802 // PACKETSTORM: 106806 // CNNVD: CNNVD-201111-254 // CNNVD: CNNVD-201209-330 // NVD: CVE-2011-5163

CREDITS

Kuang-Chun Hung

Trust: 0.9

sources: BID: 50604 // CNNVD: CNNVD-201111-254

SOURCES

db:IVDid:5faca590-2353-11e6-abef-000c29c66e3d
db:IVDid:b0d03a04-1f7f-11e6-abef-000c29c66e3d
db:IVDid:65ae310c-1f7f-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2011-5807
db:CNVDid:CNVD-2011-4804
db:VULHUBid:VHN-53108
db:BIDid:50604
db:BIDid:77854
db:JVNDBid:JVNDB-2011-005156
db:PACKETSTORMid:106802
db:PACKETSTORMid:106806
db:CNNVDid:CNNVD-201111-254
db:CNNVDid:CNNVD-201209-330
db:NVDid:CVE-2011-5163

LAST UPDATE DATE

2024-08-14T15:35:15.438000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-5807date:2011-11-15T00:00:00
db:CNVDid:CNVD-2011-4804date:2011-11-11T00:00:00
db:VULHUBid:VHN-53108date:2012-12-17T00:00:00
db:BIDid:50604date:2015-03-19T09:43:00
db:BIDid:77854date:2012-09-15T00:00:00
db:JVNDBid:JVNDB-2011-005156date:2012-09-19T00:00:00
db:CNNVDid:CNNVD-201111-254date:2011-11-15T00:00:00
db:CNNVDid:CNNVD-201209-330date:2012-09-19T00:00:00
db:NVDid:CVE-2011-5163date:2023-11-07T02:09:49.610

SOURCES RELEASE DATE

db:IVDid:5faca590-2353-11e6-abef-000c29c66e3ddate:2012-09-19T00:00:00
db:IVDid:b0d03a04-1f7f-11e6-abef-000c29c66e3ddate:2011-11-11T00:00:00
db:IVDid:65ae310c-1f7f-11e6-abef-000c29c66e3ddate:2011-11-15T00:00:00
db:CNVDid:CNVD-2011-5807date:2011-11-15T00:00:00
db:CNVDid:CNVD-2011-4804date:2011-11-11T00:00:00
db:VULHUBid:VHN-53108date:2012-09-15T00:00:00
db:BIDid:50604date:2011-11-08T00:00:00
db:BIDid:77854date:2012-09-15T00:00:00
db:JVNDBid:JVNDB-2011-005156date:2012-09-19T00:00:00
db:PACKETSTORMid:106802date:2011-11-09T03:05:37
db:PACKETSTORMid:106806date:2011-11-09T06:29:18
db:CNNVDid:CNNVD-201111-254date:1900-01-01T00:00:00
db:CNNVDid:CNNVD-201209-330date:2012-09-19T00:00:00
db:NVDid:CVE-2011-5163date:2012-09-15T17:55:04.287