Lucene search

K
certCERTVU:180119
HistoryJan 12, 2011 - 12:00 a.m.

WellinTech KingView 6.53 remote heap overflow vulnerability

2011-01-1200:00:00
www.kb.cert.org
21

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.544 Medium

EPSS

Percentile

97.6%

Overview

WellinTech KingView 6.53 contains a remote heap overflow vulnerability in the HistorySrv process which may allow a remote, unauthenticated attacker to execute arbitrary code.

Description

According to WellinTech’s website: "King__V__iew software is a high-pormance production which can be used to building a data information service platform in automatic field. KingView software can provide graphic visualization which takes your operations management, control and optimization. KingView is widely used in power, water conservancy,buildings, coalmine, environmental protection, metallurgy and so on. " KingView runs a HistorySrv service that listens on port 777 that listens for incoming connections. This service is vulnerable to a remote heap overflow when a payload containing malicious Flink and Blink pointers are sent to the service.

Exploit code for this vulnerability is publicly available.


Impact

An attacker can cause the service to crash and may be able to execute arbitrary code as the user.


Solution

According to WellinTech’s website a patch (version 6.53(2010-12-15)) has been issued to address this vulnerability.


Restrict Access

Enable firewall rules to restrict access for port 777/tcp to only trusted sources.


Vendor Information

180119

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

WellinTech Affected

Updated: January 18, 2011

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Dillon Beresford of NSS Labs.

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2011-0406
Severity Metric: 91.20 Date Public:

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.544 Medium

EPSS

Percentile

97.6%