ID

VAR-201407-0233


CVE

CVE-2014-2364


TITLE

Advantech WebAccess Vulnerable to stack-based buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2014-003487

DESCRIPTION

Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary code via a long string in the (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud, or (11) IPAddress parameter to an ActiveX control in (a) webvact.ocx, (b) dvs.ocx, or (c) webdact.ocx. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the webdact.ocx ActiveX Control. The control does not check the length of an attacker-supplied NodeName string before copying it into a fixed length buffer on the stack. This could allow an attacker to execute arbitrary code in the context of the browser process. Advantech WebAccess HMI/SCADA is an HMI/SCADA software. Advantech WebAccess webvact.ocx, dvs.ocx and webdact.ocx ActiveX controls fail to properly handle long-length named ProjectName, SetParameter, NodeName, CCDParameter, SetColor, AlarmImage, GetParameter, GetColor, ServerResponse, SetBaud and IPAddress parameters, and attackers can build malicious A WEB page that entice a user to access, can crash an application or execute arbitrary code. Advantech WebAccess is prone to multiple remote stack-based buffer-overflow vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Advantech WebAccess 7.1 and prior are vulnerable

Trust: 9.72

sources: NVD: CVE-2014-2364 // JVNDB: JVNDB-2014-003487 // ZDI: ZDI-14-243 // ZDI: ZDI-14-254 // ZDI: ZDI-14-256 // ZDI: ZDI-14-248 // ZDI: ZDI-14-242 // ZDI: ZDI-14-253 // ZDI: ZDI-14-246 // ZDI: ZDI-14-241 // ZDI: ZDI-14-255 // ZDI: ZDI-14-252 // ZDI: ZDI-14-244 // CNVD: CNVD-2014-04544 // BID: 68714 // IVD: e485769a-2351-11e6-abef-000c29c66e3d // IVD: 7d7f00b0-463f-11e9-b5c5-000c29342cb1

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 7d7f00b0-463f-11e9-b5c5-000c29342cb1 // IVD: e485769a-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-04544

AFFECTED PRODUCTS

vendor:advantechmodel:webaccessscope: - version: -

Trust: 7.7

vendor:advantechmodel:webaccessscope:eqversion:7.0

Trust: 1.6

vendor:advantechmodel:webaccessscope:eqversion:5.0

Trust: 1.6

vendor:advantechmodel:webaccessscope:eqversion:6.0

Trust: 1.6

vendor:advantechmodel:webaccessscope:ltversion:7.2

Trust: 1.4

vendor:advantechmodel:webaccessscope:lteversion:7.1

Trust: 1.0

vendor:advantechmodel:webaccessscope:eqversion:7.1

Trust: 0.6

vendor:advantech webaccessmodel: - scope:eqversion:5.0

Trust: 0.4

vendor:advantech webaccessmodel: - scope:eqversion:6.0

Trust: 0.4

vendor:advantech webaccessmodel: - scope:eqversion:7.0

Trust: 0.4

vendor:advantech webaccessmodel: - scope:eqversion:*

Trust: 0.4

sources: IVD: 7d7f00b0-463f-11e9-b5c5-000c29342cb1 // IVD: e485769a-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-244 // ZDI: ZDI-14-252 // ZDI: ZDI-14-255 // ZDI: ZDI-14-241 // ZDI: ZDI-14-246 // ZDI: ZDI-14-243 // ZDI: ZDI-14-253 // ZDI: ZDI-14-242 // ZDI: ZDI-14-248 // ZDI: ZDI-14-256 // ZDI: ZDI-14-254 // CNVD: CNVD-2014-04544 // JVNDB: JVNDB-2014-003487 // CNNVD: CNNVD-201407-476 // NVD: CVE-2014-2364

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2014-2364
value: HIGH

Trust: 7.7

nvd@nist.gov: CVE-2014-2364
value: HIGH

Trust: 1.0

NVD: CVE-2014-2364
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-04544
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201407-476
value: HIGH

Trust: 0.6

IVD: 7d7f00b0-463f-11e9-b5c5-000c29342cb1
value: HIGH

Trust: 0.2

IVD: e485769a-2351-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2014-2364
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 9.5

CNVD: CNVD-2014-04544
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 7d7f00b0-463f-11e9-b5c5-000c29342cb1
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: e485769a-2351-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 7d7f00b0-463f-11e9-b5c5-000c29342cb1 // IVD: e485769a-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-244 // ZDI: ZDI-14-252 // ZDI: ZDI-14-255 // ZDI: ZDI-14-241 // ZDI: ZDI-14-246 // ZDI: ZDI-14-243 // ZDI: ZDI-14-253 // ZDI: ZDI-14-242 // ZDI: ZDI-14-248 // ZDI: ZDI-14-256 // ZDI: ZDI-14-254 // CNVD: CNVD-2014-04544 // JVNDB: JVNDB-2014-003487 // CNNVD: CNNVD-201407-476 // NVD: CVE-2014-2364

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2014-003487 // NVD: CVE-2014-2364

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201407-476

TYPE

Buffer overflow

Trust: 1.0

sources: IVD: 7d7f00b0-463f-11e9-b5c5-000c29342cb1 // IVD: e485769a-2351-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201407-476

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-003487

PATCH

title:Advantech has issued an update to correct this vulnerability.url:http://ics-cert.us-cert.gov/advisories/ICSA-14-198-02

Trust: 7.7

title:Downloads ::: WebAccess Softwareurl:http://webaccess.advantech.com/downloads.php?item=software

Trust: 0.8

title:Advantech WebAccessurl:http://webaccess.advantech.com/

Trust: 0.8

title:Advantech WebAccess patch for multiple ActiveX control buffer overflow vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/47828

Trust: 0.6

sources: ZDI: ZDI-14-244 // ZDI: ZDI-14-252 // ZDI: ZDI-14-255 // ZDI: ZDI-14-241 // ZDI: ZDI-14-246 // ZDI: ZDI-14-243 // ZDI: ZDI-14-253 // ZDI: ZDI-14-242 // ZDI: ZDI-14-248 // ZDI: ZDI-14-256 // ZDI: ZDI-14-254 // CNVD: CNVD-2014-04544 // JVNDB: JVNDB-2014-003487

EXTERNAL IDS

db:NVDid:CVE-2014-2364

Trust: 11.4

db:ICS CERTid:ICSA-14-198-02

Trust: 3.0

db:BIDid:68714

Trust: 1.9

db:CNVDid:CNVD-2014-04544

Trust: 1.0

db:CNNVDid:CNNVD-201407-476

Trust: 1.0

db:PACKETSTORMid:128384

Trust: 1.0

db:JVNDBid:JVNDB-2014-003487

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2045

Trust: 0.7

db:ZDIid:ZDI-14-244

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-2062

Trust: 0.7

db:ZDIid:ZDI-14-252

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-2066

Trust: 0.7

db:ZDIid:ZDI-14-255

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-2032

Trust: 0.7

db:ZDIid:ZDI-14-241

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-2065

Trust: 0.7

db:ZDIid:ZDI-14-246

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-2044

Trust: 0.7

db:ZDIid:ZDI-14-243

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-2063

Trust: 0.7

db:ZDIid:ZDI-14-253

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-2043

Trust: 0.7

db:ZDIid:ZDI-14-242

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-2069

Trust: 0.7

db:ZDIid:ZDI-14-248

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-2067

Trust: 0.7

db:ZDIid:ZDI-14-256

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-2064

Trust: 0.7

db:ZDIid:ZDI-14-254

Trust: 0.7

db:IVDid:7D7F00B0-463F-11E9-B5C5-000C29342CB1

Trust: 0.2

db:IVDid:E485769A-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 7d7f00b0-463f-11e9-b5c5-000c29342cb1 // IVD: e485769a-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-14-244 // ZDI: ZDI-14-252 // ZDI: ZDI-14-255 // ZDI: ZDI-14-241 // ZDI: ZDI-14-246 // ZDI: ZDI-14-243 // ZDI: ZDI-14-253 // ZDI: ZDI-14-242 // ZDI: ZDI-14-248 // ZDI: ZDI-14-256 // ZDI: ZDI-14-254 // CNVD: CNVD-2014-04544 // BID: 68714 // JVNDB: JVNDB-2014-003487 // CNNVD: CNNVD-201407-476 // NVD: CVE-2014-2364

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-14-198-02

Trust: 10.7

url:http://packetstormsecurity.com/files/128384/advantech-webaccess-dvs.ocx-getcolor-buffer-overflow.html

Trust: 1.0

url:http://www.securityfocus.com/bid/68714

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2364

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2364

Trust: 0.8

sources: ZDI: ZDI-14-244 // ZDI: ZDI-14-252 // ZDI: ZDI-14-255 // ZDI: ZDI-14-241 // ZDI: ZDI-14-246 // ZDI: ZDI-14-243 // ZDI: ZDI-14-253 // ZDI: ZDI-14-242 // ZDI: ZDI-14-248 // ZDI: ZDI-14-256 // ZDI: ZDI-14-254 // CNVD: CNVD-2014-04544 // JVNDB: JVNDB-2014-003487 // CNNVD: CNNVD-201407-476 // NVD: CVE-2014-2364

CREDITS

Anonymous

Trust: 4.9

sources: ZDI: ZDI-14-252 // ZDI: ZDI-14-255 // ZDI: ZDI-14-246 // ZDI: ZDI-14-253 // ZDI: ZDI-14-248 // ZDI: ZDI-14-256 // ZDI: ZDI-14-254

SOURCES

db:IVDid:7d7f00b0-463f-11e9-b5c5-000c29342cb1
db:IVDid:e485769a-2351-11e6-abef-000c29c66e3d
db:ZDIid:ZDI-14-244
db:ZDIid:ZDI-14-252
db:ZDIid:ZDI-14-255
db:ZDIid:ZDI-14-241
db:ZDIid:ZDI-14-246
db:ZDIid:ZDI-14-243
db:ZDIid:ZDI-14-253
db:ZDIid:ZDI-14-242
db:ZDIid:ZDI-14-248
db:ZDIid:ZDI-14-256
db:ZDIid:ZDI-14-254
db:CNVDid:CNVD-2014-04544
db:BIDid:68714
db:JVNDBid:JVNDB-2014-003487
db:CNNVDid:CNNVD-201407-476
db:NVDid:CVE-2014-2364

LAST UPDATE DATE

2024-11-22T22:46:55.418000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-14-244date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-252date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-255date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-241date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-246date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-243date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-253date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-242date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-248date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-256date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-254date:2014-07-18T00:00:00
db:CNVDid:CNVD-2014-04544date:2014-07-24T00:00:00
db:BIDid:68714date:2014-09-25T00:03:00
db:JVNDBid:JVNDB-2014-003487date:2014-07-22T00:00:00
db:CNNVDid:CNNVD-201407-476date:2014-07-24T00:00:00
db:NVDid:CVE-2014-2364date:2015-08-11T14:38:48.603

SOURCES RELEASE DATE

db:IVDid:7d7f00b0-463f-11e9-b5c5-000c29342cb1date:2014-07-24T00:00:00
db:IVDid:e485769a-2351-11e6-abef-000c29c66e3ddate:2014-07-24T00:00:00
db:ZDIid:ZDI-14-244date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-252date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-255date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-241date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-246date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-243date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-253date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-242date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-248date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-256date:2014-07-18T00:00:00
db:ZDIid:ZDI-14-254date:2014-07-18T00:00:00
db:CNVDid:CNVD-2014-04544date:2014-07-24T00:00:00
db:BIDid:68714date:2014-07-18T00:00:00
db:JVNDBid:JVNDB-2014-003487date:2014-07-22T00:00:00
db:CNNVDid:CNNVD-201407-476date:2014-07-24T00:00:00
db:NVDid:CVE-2014-2364date:2014-07-19T05:09:27.563