ID

VAR-201708-1578


TITLE

Advantech WebAccess RtspVapgDecoderNew2 PMSettingData3D Width Stack Buffer Overflow Remote Code Execution Vulnerability

Trust: 1.0

sources: IVD: e018dbe7-3f33-48d3-9d02-da56931bf1f5 // IVD: 7d7b572f-463f-11e9-9535-000c29342cb1 // CNVD: CNVD-2017-19444

DESCRIPTION

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within RtspVapgDecoderNew2.dll. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of the process. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment

Trust: 1.53

sources: ZDI: ZDI-17-558 // CNVD: CNVD-2017-19444 // IVD: e018dbe7-3f33-48d3-9d02-da56931bf1f5 // IVD: 7d7b572f-463f-11e9-9535-000c29342cb1

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: e018dbe7-3f33-48d3-9d02-da56931bf1f5 // IVD: 7d7b572f-463f-11e9-9535-000c29342cb1 // CNVD: CNVD-2017-19444

AFFECTED PRODUCTS

vendor:advantechmodel:webaccessscope: - version: -

Trust: 1.3

vendor:advantechmodel:webaccessscope:eqversion:*

Trust: 0.4

sources: IVD: e018dbe7-3f33-48d3-9d02-da56931bf1f5 // IVD: 7d7b572f-463f-11e9-9535-000c29342cb1 // ZDI: ZDI-17-558 // CNVD: CNVD-2017-19444

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: ZDI-17-558
value: HIGH

Trust: 0.7

CNVD: CNVD-2017-19444
value: HIGH

Trust: 0.6

IVD: e018dbe7-3f33-48d3-9d02-da56931bf1f5
value: HIGH

Trust: 0.2

IVD: 7d7b572f-463f-11e9-9535-000c29342cb1
value: HIGH

Trust: 0.2

ZDI: ZDI-17-558
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

CNVD: CNVD-2017-19444
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e018dbe7-3f33-48d3-9d02-da56931bf1f5
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 7d7b572f-463f-11e9-9535-000c29342cb1
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: e018dbe7-3f33-48d3-9d02-da56931bf1f5 // IVD: 7d7b572f-463f-11e9-9535-000c29342cb1 // ZDI: ZDI-17-558 // CNVD: CNVD-2017-19444

TYPE

Buffer overflow

Trust: 0.4

sources: IVD: e018dbe7-3f33-48d3-9d02-da56931bf1f5 // IVD: 7d7b572f-463f-11e9-9535-000c29342cb1

PATCH

title:This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline.11/08/2016, 11/09/2016, 11/10/2016 and 11/15/2016 - ZDI disclosed the reports, 44 in all, to ICS-CERT11/09/2016 - The vendor acknowledged receipt of the report through ICS-CERT and ICS-CERT provided ICS-VU-71410304/27/2017 - ICS-CERT notified ZDI these might be fixed in the latest version and asked would ZDI re-test05/03/2017 - ZDI replied that we cannot do the testing for AdvantechICS-CERT did not respond06/23/2017 - ZDI wrote to ICS-CERT requesting any available update07/31/2017 - ZDI wrote to ICS-CERT requesting any available update08/01/2017 - ZDI wrote to ICS-CERT advising of the intent to 0-day-- Mitigation:The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507FIf the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser.For more information, please see: url:http://support.microsoft.com/kb/240797

Trust: 0.7

sources: ZDI: ZDI-17-558

EXTERNAL IDS

db:ZDIid:ZDI-17-558

Trust: 1.3

db:CNVDid:CNVD-2017-19444

Trust: 1.0

db:ZDI_CANid:ZDI-CAN-4085

Trust: 0.7

db:IVDid:E018DBE7-3F33-48D3-9D02-DA56931BF1F5

Trust: 0.2

db:IVDid:7D7B572F-463F-11E9-9535-000C29342CB1

Trust: 0.2

sources: IVD: e018dbe7-3f33-48d3-9d02-da56931bf1f5 // IVD: 7d7b572f-463f-11e9-9535-000c29342cb1 // ZDI: ZDI-17-558 // CNVD: CNVD-2017-19444

REFERENCES

url:http://support.microsoft.com/kb/240797

Trust: 0.7

url:http://www.zerodayinitiative.com/advisories/zdi-17-558/

Trust: 0.6

sources: ZDI: ZDI-17-558 // CNVD: CNVD-2017-19444

CREDITS

Anonymous

Trust: 0.7

sources: ZDI: ZDI-17-558

SOURCES

db:IVDid:e018dbe7-3f33-48d3-9d02-da56931bf1f5
db:IVDid:7d7b572f-463f-11e9-9535-000c29342cb1
db:ZDIid:ZDI-17-558
db:CNVDid:CNVD-2017-19444

LAST UPDATE DATE

2022-05-17T01:43:11.243000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-558date:2017-08-07T00:00:00
db:CNVDid:CNVD-2017-19444date:2017-08-08T00:00:00

SOURCES RELEASE DATE

db:IVDid:e018dbe7-3f33-48d3-9d02-da56931bf1f5date:2017-08-08T00:00:00
db:IVDid:7d7b572f-463f-11e9-9535-000c29342cb1date:2017-08-08T00:00:00
db:ZDIid:ZDI-17-558date:2017-08-07T00:00:00
db:CNVDid:CNVD-2017-19444date:2017-08-08T00:00:00