ID

VAR-201708-1406


CVE

CVE-2017-9659


TITLE

Fuji Electric Monitouch V-SFT Project File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability

Trust: 1.4

sources: ZDI: ZDI-17-644 // ZDI: ZDI-17-643

DESCRIPTION

A Stack-Based Buffer Overflow issue was discovered in Fuji Electric Monitouch V-SFT versions prior to Version 5.4.43.0. The stack-based buffer overflow vulnerability has been identified, which may cause a crash or allow remote code execution. Fuji Electric Monitouch V-SFT Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within parsing of a V8 project file. The issue lies in the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of the process. Fuji Electric Monitouch V-SFT is an HMI software. Failed exploit attempts will result in denial-of-service conditions

Trust: 3.87

sources: NVD: CVE-2017-9659 // JVNDB: JVNDB-2017-007179 // ZDI: ZDI-17-644 // ZDI: ZDI-17-643 // CNVD: CNVD-2017-22804 // BID: 100265 // IVD: e14e25dd-b97b-42e6-840a-4d68e6949fdb

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e14e25dd-b97b-42e6-840a-4d68e6949fdb // CNVD: CNVD-2017-22804

AFFECTED PRODUCTS

vendor:fuji electricmodel:monitouch v-sftscope: - version: -

Trust: 1.4

vendor:fujielectricmodel:monitouch v-sftscope:lteversion:5.4.42.0

Trust: 1.0

vendor:fuji electricmodel:monitouch v-sftscope:ltversion:5.4.43.0

Trust: 0.8

vendor:fujimodel:electric monitouch v-sftscope:ltversion:5.4.43.0

Trust: 0.6

vendor:fujielectricmodel:monitouch v-sftscope:eqversion:5.4.42.0

Trust: 0.6

vendor:fujimodel:electric monitouch v-sftscope:eqversion:5.4.42.0

Trust: 0.3

vendor:fujimodel:electric monitouch v-sftscope:neversion:5.4.43.0

Trust: 0.3

vendor:monitouch v sftmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: e14e25dd-b97b-42e6-840a-4d68e6949fdb // ZDI: ZDI-17-644 // ZDI: ZDI-17-643 // CNVD: CNVD-2017-22804 // BID: 100265 // JVNDB: JVNDB-2017-007179 // CNNVD: CNNVD-201706-578 // NVD: CVE-2017-9659

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2017-9659
value: MEDIUM

Trust: 1.4

nvd@nist.gov: CVE-2017-9659
value: HIGH

Trust: 1.0

NVD: CVE-2017-9659
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-22804
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201706-578
value: MEDIUM

Trust: 0.6

IVD: e14e25dd-b97b-42e6-840a-4d68e6949fdb
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2017-9659
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 3.2

CNVD: CNVD-2017-22804
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e14e25dd-b97b-42e6-840a-4d68e6949fdb
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2017-9659
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: e14e25dd-b97b-42e6-840a-4d68e6949fdb // ZDI: ZDI-17-644 // ZDI: ZDI-17-643 // CNVD: CNVD-2017-22804 // JVNDB: JVNDB-2017-007179 // CNNVD: CNNVD-201706-578 // NVD: CVE-2017-9659

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2017-007179 // NVD: CVE-2017-9659

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201706-578

TYPE

Buffer overflow

Trust: 0.8

sources: IVD: e14e25dd-b97b-42e6-840a-4d68e6949fdb // CNNVD: CNNVD-201706-578

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-007179

PATCH

title:Fuji Electric has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-17-222-04

Trust: 1.4

title:Monitouch V-SFTurl:http://www.hakko-elec.co.jp/site/vsft/

Trust: 0.8

title:Fuji Electric Monitouch V-SFT project file parsing heap buffer overflow vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/100821

Trust: 0.6

sources: ZDI: ZDI-17-644 // ZDI: ZDI-17-643 // CNVD: CNVD-2017-22804 // JVNDB: JVNDB-2017-007179

EXTERNAL IDS

db:NVDid:CVE-2017-9659

Trust: 4.9

db:ICS CERTid:ICSA-17-222-04

Trust: 3.3

db:ZDIid:ZDI-17-644

Trust: 2.6

db:ZDIid:ZDI-17-643

Trust: 2.6

db:BIDid:100265

Trust: 1.3

db:CNVDid:CNVD-2017-22804

Trust: 0.8

db:CNNVDid:CNNVD-201706-578

Trust: 0.8

db:JVNDBid:JVNDB-2017-007179

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-4014

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-3993

Trust: 0.7

db:ZDIid:ZDI-17-645

Trust: 0.3

db:IVDid:E14E25DD-B97B-42E6-840A-4D68E6949FDB

Trust: 0.2

sources: IVD: e14e25dd-b97b-42e6-840a-4d68e6949fdb // ZDI: ZDI-17-644 // ZDI: ZDI-17-643 // CNVD: CNVD-2017-22804 // BID: 100265 // JVNDB: JVNDB-2017-007179 // CNNVD: CNNVD-201706-578 // NVD: CVE-2017-9659

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-222-04

Trust: 4.7

url:http://www.zerodayinitiative.com/advisories/zdi-17-643/

Trust: 1.9

url:http://www.zerodayinitiative.com/advisories/zdi-17-644/

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2017-9659

Trust: 1.4

url:http://www.securityfocus.com/bid/100265

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9659

Trust: 0.8

url:http://www.fujielectric.com/

Trust: 0.3

url:www.zerodayinitiative.com/advisories/zdi-17-645

Trust: 0.3

sources: ZDI: ZDI-17-644 // ZDI: ZDI-17-643 // CNVD: CNVD-2017-22804 // BID: 100265 // JVNDB: JVNDB-2017-007179 // CNNVD: CNNVD-201706-578 // NVD: CVE-2017-9659

CREDITS

Ariele Caltabiano (kimiya)

Trust: 1.4

sources: ZDI: ZDI-17-644 // ZDI: ZDI-17-643

SOURCES

db:IVDid:e14e25dd-b97b-42e6-840a-4d68e6949fdb
db:ZDIid:ZDI-17-644
db:ZDIid:ZDI-17-643
db:CNVDid:CNVD-2017-22804
db:BIDid:100265
db:JVNDBid:JVNDB-2017-007179
db:CNNVDid:CNNVD-201706-578
db:NVDid:CVE-2017-9659

LAST UPDATE DATE

2024-08-14T13:56:36.811000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-644date:2017-08-10T00:00:00
db:ZDIid:ZDI-17-643date:2017-08-10T00:00:00
db:CNVDid:CNVD-2017-22804date:2017-08-25T00:00:00
db:BIDid:100265date:2017-08-10T00:00:00
db:JVNDBid:JVNDB-2017-007179date:2017-09-13T00:00:00
db:CNNVDid:CNNVD-201706-578date:2017-08-15T00:00:00
db:NVDid:CVE-2017-9659date:2017-08-24T17:11:43.013

SOURCES RELEASE DATE

db:IVDid:e14e25dd-b97b-42e6-840a-4d68e6949fdbdate:2017-08-25T00:00:00
db:ZDIid:ZDI-17-644date:2017-08-10T00:00:00
db:ZDIid:ZDI-17-643date:2017-08-10T00:00:00
db:CNVDid:CNVD-2017-22804date:2017-08-25T00:00:00
db:BIDid:100265date:2017-08-10T00:00:00
db:JVNDBid:JVNDB-2017-007179date:2017-09-13T00:00:00
db:CNNVDid:CNNVD-201706-578date:2017-06-15T00:00:00
db:NVDid:CVE-2017-9659date:2017-08-14T16:29:00.320