10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.544 Medium
EPSS
Percentile
97.6%
WellinTech KingView 6.53 contains a remote heap overflow vulnerability in the HistorySrv
process which may allow a remote, unauthenticated attacker to execute arbitrary code.
According to WellinTech’s website: "King__V__iew software is a high-pormance production which can be used to building a data information service platform in automatic field. KingView software can provide graphic visualization which takes your operations management, control and optimization. KingView is widely used in power, water conservancy,buildings, coalmine, environmental protection, metallurgy and so on. " KingView runs a HistorySrv
service that listens on port 777 that listens for incoming connections. This service is vulnerable to a remote heap overflow when a payload containing malicious Flink
and Blink
pointers are sent to the service.
Exploit code for this vulnerability is publicly available.
An attacker can cause the service to crash and may be able to execute arbitrary code as the user.
According to WellinTech’s website a patch (version 6.53(2010-12-15)) has been issued to address this vulnerability.
Restrict Access
Enable firewall rules to restrict access for port 777/tcp to only trusted sources.
180119
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: January 18, 2011
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was reported by Dillon Beresford of NSS Labs.
This document was written by Michael Orlando.
CVE IDs: | CVE-2011-0406 |
---|---|
Severity Metric: | 91.20 Date Public: |
en.wellintech.com/products/detail.aspx?contentid=25
secunia.com/advisories/42851
thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html
thesauceofutterpwnage.blogspot.com/2011/01/wellintech-issues-security-patch-to.html
threatpost.com/en_us/blogs/china-cert-we-missed-report-scada-hole-011311
www.cert.org.cn/articles/bulletin/common/2011011325250.shtml
www.cnnvd.org.cn/showCnnvd.html?id=2011010108
www.kingview.com/news/detail.aspx?contentid=528
www.us-cert.gov/control_systems/pdf/ICSA-11-017-01.pdf