ID

VAR-201301-0033


CVE

CVE-2012-4689


TITLE

GE Proficy HMI/SCADA CIMPLICITY Denial of service vulnerability

Trust: 1.1

sources: IVD: 2204923e-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-00198 // BID: 57188

DESCRIPTION

Integer overflow in CimWebServer.exe in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY 4.01 through 8.0, and Proficy Process Systems with CIMPLICITY, allows remote attackers to cause a denial of service (daemon crash) via a malformed HTTP request. GE Proficy HMI/SCADA-CIMPLICITY is software for monitoring and controlling scada devices. There are security vulnerabilities in GE Proficy HMI/SCADA-CIMPLICITY 4.01 and other versions. An attacker could exploit this vulnerability to compromise an affected application and deny service to legitimate users. GE Proficy HMI/SCADA-CIMPLICITY is prone to a remote denial-of-service vulnerability. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Proficy HMI/SCADA - CIMPLICITY Web Server Integer Overflow Vulnerability SECUNIA ADVISORY ID: SA51789 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51789/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51789 RELEASE DATE: 2013-01-09 DISCUSS ADVISORY: http://secunia.com/advisories/51789/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51789/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51789 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Proficy HMI/SCADA - CIMPLICITY, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an integer overflow error within the web server (CimWebServer.exe) when handling certain HTTP data and can be exploited to crash the web server. The vulnerability is reported in versions 8.0 and later. SOLUTION: Apply patches (please see vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Kuang-Chun Hung, Information and Communication Security Technology Center. ORIGINAL ADVISORY: GE: http://support.ge-ip.com/support/index?page=kbchannel&id=S:KB15153 ICS-CERT (ICSA-12-341-01): http://www.us-cert.gov/control_systems/pdf/ICSA-12-341-01.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.7

sources: NVD: CVE-2012-4689 // JVNDB: JVNDB-2013-001206 // CNVD: CNVD-2013-00198 // BID: 57188 // IVD: 2204923e-2353-11e6-abef-000c29c66e3d // PACKETSTORM: 119429

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 2204923e-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-00198

AFFECTED PRODUCTS

vendor:gemodel:intelligent platforms proficy process systems with cimplicityscope:eqversion: -

Trust: 1.6

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:7.5

Trust: 1.6

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:4.01

Trust: 1.6

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:8.0

Trust: 1.6

vendor:gemodel:intelligent platforms proficy process systemsscope:eqversion: -

Trust: 1.0

vendor:general electricmodel:proficy hmi/scada - cimplicityscope:eqversion:4.01 to 8.0

Trust: 0.8

vendor:ge fanuc automationmodel:proficy hmi/scada-cimplicityscope: - version: -

Trust: 0.6

vendor:ge fanuc automationmodel:proficy hmi/scada-cimplicityscope:eqversion:4.01

Trust: 0.6

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:4.01

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:7.5

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:8.0

Trust: 0.2

sources: IVD: 2204923e-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-00198 // JVNDB: JVNDB-2013-001206 // CNNVD: CNNVD-201301-121 // NVD: CVE-2012-4689

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4689
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-4689
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201301-121
value: MEDIUM

Trust: 0.6

IVD: 2204923e-2353-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2012-4689
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 2204923e-2353-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 2204923e-2353-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2013-001206 // CNNVD: CNNVD-201301-121 // NVD: CVE-2012-4689

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.8

sources: JVNDB: JVNDB-2013-001206 // NVD: CVE-2012-4689

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201301-121

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-201301-121

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001206

PATCH

title:Proficy HMI/SCADA - CIMPLICITYurl:http://www.ge-ip.com/products/proficy-hmi-scada-cimplicity/p2819

Trust: 0.8

title:監視制御ソフトウェア(SCADA) CIMPLICITYurl:http://www.ge-ip.co.jp/cimpli-ta.html

Trust: 0.8

title:GE Proficy HMI/SCADA CIMPLICITY Denial of Service Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/28671

Trust: 0.6

sources: CNVD: CNVD-2013-00198 // JVNDB: JVNDB-2013-001206

EXTERNAL IDS

db:NVDid:CVE-2012-4689

Trust: 3.5

db:ICS CERTid:ICSA-12-341-01

Trust: 2.5

db:BIDid:57188

Trust: 1.5

db:CNVDid:CNVD-2013-00198

Trust: 0.8

db:CNNVDid:CNNVD-201301-121

Trust: 0.8

db:JVNDBid:JVNDB-2013-001206

Trust: 0.8

db:SECUNIAid:51789

Trust: 0.8

db:IVDid:2204923E-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:119429

Trust: 0.1

sources: IVD: 2204923e-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-00198 // BID: 57188 // JVNDB: JVNDB-2013-001206 // PACKETSTORM: 119429 // CNNVD: CNNVD-201301-121 // NVD: CVE-2012-4689

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-341-01.pdf

Trust: 2.5

url:http://support.ge-ip.com/support/index?page=kbchannel&id=s:kb15153

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4689

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4689

Trust: 0.8

url:http://www.securityfocus.com/bid/57188http

Trust: 0.6

url:http://secunia.com/advisories/51789

Trust: 0.6

url:http://www.securityfocus.com/bid/57188

Trust: 0.6

url:http://secunia.com/advisories/51789/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51789

Trust: 0.1

url:http://secunia.com/advisories/51789/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2013-00198 // JVNDB: JVNDB-2013-001206 // PACKETSTORM: 119429 // CNNVD: CNNVD-201301-121 // NVD: CVE-2012-4689

CREDITS

Kuang-Chun Hung of Information and Communication Security Technology Center

Trust: 0.9

sources: BID: 57188 // CNNVD: CNNVD-201301-121

SOURCES

db:IVDid:2204923e-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2013-00198
db:BIDid:57188
db:JVNDBid:JVNDB-2013-001206
db:PACKETSTORMid:119429
db:CNNVDid:CNNVD-201301-121
db:NVDid:CVE-2012-4689

LAST UPDATE DATE

2024-11-23T22:35:25.489000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-00198date:2013-01-11T00:00:00
db:BIDid:57188date:2012-12-06T00:00:00
db:JVNDBid:JVNDB-2013-001206date:2013-01-22T00:00:00
db:CNNVDid:CNNVD-201301-121date:2013-01-18T00:00:00
db:NVDid:CVE-2012-4689date:2024-11-21T01:43:21.730

SOURCES RELEASE DATE

db:IVDid:2204923e-2353-11e6-abef-000c29c66e3ddate:2013-01-11T00:00:00
db:CNVDid:CNVD-2013-00198date:2013-01-11T00:00:00
db:BIDid:57188date:2012-12-06T00:00:00
db:JVNDBid:JVNDB-2013-001206date:2013-01-22T00:00:00
db:PACKETSTORMid:119429date:2013-01-10T07:53:28
db:CNNVDid:CNNVD-201301-121date:2012-12-06T00:00:00
db:NVDid:CVE-2012-4689date:2013-01-17T16:55:01.780