ID

VAR-201405-0534


CVE

CVE-2014-3788


TITLE

Cogent Real-Time Systems Cogent DataHub Heap Buffer Overflow Vulnerability

Trust: 1.0

sources: IVD: 7d7c418f-463f-11e9-81dd-000c29342cb1 // IVD: f6fe402c-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-03282

DESCRIPTION

Heap-based buffer overflow in the Web Server in Cogent Real-Time Systems Cogent DataHub before 7.3.5 allows remote attackers to execute arbitrary code via a negative value in the Content-Length field in a request. Authentication is not required to exploit this vulnerability. The specific flaw exists within the included Web Server. By providing a request with a crafted Content-Length field, an attacker is able to overflow a heap buffer. An attacker could leverage this to execute arbitrary code in the context of the DataHub process. Cogent DataHub is software for SCADA and automation. Failed exploit attempts will likely result in denial-of-service conditions. Versions prior to Cogent DataHub 7.3.5 are vulnerable

Trust: 3.42

sources: NVD: CVE-2014-3788 // JVNDB: JVNDB-2014-002620 // ZDI: ZDI-14-135 // CNVD: CNVD-2014-03282 // BID: 67485 // IVD: 7d7c418f-463f-11e9-81dd-000c29342cb1 // IVD: f6fe402c-2351-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 7d7c418f-463f-11e9-81dd-000c29342cb1 // IVD: f6fe402c-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-03282

AFFECTED PRODUCTS

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.3.3

Trust: 1.9

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.3.2

Trust: 1.9

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.0

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.3.0

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.1

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.2.2

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.1.63

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.2

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.0

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.0.2

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.3.1

Trust: 1.0

vendor:cogentdatahubmodel:cogent datahubscope:lteversion:7.3.4

Trust: 1.0

vendor:cogent real timemodel:datahubscope:ltversion:7.3.5

Trust: 0.8

vendor:cogent real timemodel:datahubscope: - version: -

Trust: 0.7

vendor:cogentmodel:real-time systems cogent datahubscope:ltversion:7.3.5

Trust: 0.6

vendor:cogent datahubmodel: - scope:eqversion:7.0

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.0.2

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.1.0

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.1.1

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.1.1.63

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.1.2

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.2.2

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.3.0

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.3.1

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.3.2

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:7.3.3

Trust: 0.4

vendor:cogent datahubmodel: - scope:eqversion:*

Trust: 0.4

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.3.4

Trust: 0.3

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.3

Trust: 0.3

vendor:cogentdatahubmodel:cogent datahubscope:neversion:7.3.5

Trust: 0.3

sources: IVD: 7d7c418f-463f-11e9-81dd-000c29342cb1 // IVD: f6fe402c-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-135 // CNVD: CNVD-2014-03282 // BID: 67485 // JVNDB: JVNDB-2014-002620 // CNNVD: CNNVD-201405-458 // NVD: CVE-2014-3788

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3788
value: HIGH

Trust: 1.0

NVD: CVE-2014-3788
value: HIGH

Trust: 0.8

ZDI: CVE-2014-3788
value: HIGH

Trust: 0.7

CNVD: CNVD-2014-03282
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201405-458
value: HIGH

Trust: 0.6

IVD: 7d7c418f-463f-11e9-81dd-000c29342cb1
value: HIGH

Trust: 0.2

IVD: f6fe402c-2351-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2014-3788
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.5

CNVD: CNVD-2014-03282
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 7d7c418f-463f-11e9-81dd-000c29342cb1
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: f6fe402c-2351-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 7d7c418f-463f-11e9-81dd-000c29342cb1 // IVD: f6fe402c-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-135 // CNVD: CNVD-2014-03282 // JVNDB: JVNDB-2014-002620 // CNNVD: CNNVD-201405-458 // NVD: CVE-2014-3788

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2014-002620 // NVD: CVE-2014-3788

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201405-458

TYPE

Buffer overflow

Trust: 1.0

sources: IVD: 7d7c418f-463f-11e9-81dd-000c29342cb1 // IVD: f6fe402c-2351-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201405-458

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-002620

PATCH

title:Release Notesurl:http://cogentdatahub.com/ReleaseNotes.html

Trust: 1.5

title:Cogent Real-Time Systems Cogent DataHub Patch Buffer Overflow Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/45912

Trust: 0.6

sources: ZDI: ZDI-14-135 // CNVD: CNVD-2014-03282 // JVNDB: JVNDB-2014-002620

EXTERNAL IDS

db:NVDid:CVE-2014-3788

Trust: 4.4

db:ZDIid:ZDI-14-135

Trust: 4.0

db:CNVDid:CNVD-2014-03282

Trust: 1.0

db:CNNVDid:CNNVD-201405-458

Trust: 1.0

db:BIDid:67485

Trust: 0.9

db:JVNDBid:JVNDB-2014-002620

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2192

Trust: 0.7

db:IVDid:7D7C418F-463F-11E9-81DD-000C29342CB1

Trust: 0.2

db:IVDid:F6FE402C-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 7d7c418f-463f-11e9-81dd-000c29342cb1 // IVD: f6fe402c-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-135 // CNVD: CNVD-2014-03282 // BID: 67485 // JVNDB: JVNDB-2014-002620 // CNNVD: CNNVD-201405-458 // NVD: CVE-2014-3788

REFERENCES

url:http://www.zerodayinitiative.com/advisories/zdi-14-135/

Trust: 3.3

url:http://cogentdatahub.com/releasenotes.html

Trust: 2.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3788

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3788

Trust: 0.8

url:http://www.cogentdatahub.com/index.html

Trust: 0.3

sources: ZDI: ZDI-14-135 // CNVD: CNVD-2014-03282 // BID: 67485 // JVNDB: JVNDB-2014-002620 // CNNVD: CNNVD-201405-458 // NVD: CVE-2014-3788

CREDITS

Pawel Wylecial

Trust: 1.0

sources: ZDI: ZDI-14-135 // BID: 67485

SOURCES

db:IVDid:7d7c418f-463f-11e9-81dd-000c29342cb1
db:IVDid:f6fe402c-2351-11e6-abef-000c29c66e3d
db:ZDIid:ZDI-14-135
db:CNVDid:CNVD-2014-03282
db:BIDid:67485
db:JVNDBid:JVNDB-2014-002620
db:CNNVDid:CNNVD-201405-458
db:NVDid:CVE-2014-3788

LAST UPDATE DATE

2024-11-23T23:02:48.904000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-14-135date:2014-05-19T00:00:00
db:CNVDid:CNVD-2014-03282date:2014-05-28T00:00:00
db:BIDid:67485date:2015-03-19T08:27:00
db:JVNDBid:JVNDB-2014-002620date:2014-05-26T00:00:00
db:CNNVDid:CNNVD-201405-458date:2014-05-26T00:00:00
db:NVDid:CVE-2014-3788date:2024-11-21T02:08:50.097

SOURCES RELEASE DATE

db:IVDid:7d7c418f-463f-11e9-81dd-000c29342cb1date:2014-05-28T00:00:00
db:IVDid:f6fe402c-2351-11e6-abef-000c29c66e3ddate:2014-05-28T00:00:00
db:ZDIid:ZDI-14-135date:2014-05-19T00:00:00
db:CNVDid:CNVD-2014-03282date:2014-05-28T00:00:00
db:BIDid:67485date:2014-04-29T00:00:00
db:JVNDBid:JVNDB-2014-002620date:2014-05-26T00:00:00
db:CNNVDid:CNNVD-201405-458date:2014-05-26T00:00:00
db:NVDid:CVE-2014-3788date:2014-05-22T23:55:03.410