LiveData Protocol Server fails to properly handle requests for WSDL files

2007-05-03T00:00:00
ID VU:213516
Type cert
Reporter CERT
Modified 2008-07-21T00:00:00

Description

Overview

The LiveData Protocol Server fails to properly handle requests. This vulnerability may allow a remote attacker to execute arbitrary code.

Description

The LiveData Protocol Server is real-time data acquisition and processing software used to record and transmit data among process control networks in SCADA environment. A vulnerability exists in the way LiveData Protocol Server handles requests for Web Services Description Language (WSDL) files that may allow a remote attacker to execute arbitrary code. According to iDefense Security Advisory 05.02.07:

By supplying a specially crafted request to the service on port 8080, an attacker is able to supply a negative length value to a strncpy call. This value is interpreted by strncpy as a very large positive value. As a result, a memory access violation occurs when attempting to write data past the end of the heap memory segment.

Note that this affects versions of LiveData Protocol Server through 5.00.045.


Impact

A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service.


Solution

Update
LiveData has released updates to address this issue. See the LiveData downloads website for updated versions.


Block or restrict access

Block or restrict access to the LiveData Protocol Server (8080/tcp) from untrusted networks such as the internet.


Systems Affected

Vendor| Status| Date Notified| Date Updated
---|---|---|---
LiveData Inc.| | -| 03 May 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A

References

  • <http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=523>
  • <http://secunia.com/advisories/25076/>
  • <http://www.livedata.com/content/view/46/23/>

Credit

This vulnerability was reported in iDefense Security Advisory 05.02.07.

This document was written by Chris Taschner.

Other Information

  • CVE IDs: CVE-2007-2489
  • Date Public: 02 May 2007
  • Date First Published: 03 May 2007
  • Date Last Updated: 21 Jul 2008
  • Severity Metric: 13.47
  • Document Revision: 17