Lucene search

K
certCERTVU:213516
HistoryMay 03, 2007 - 12:00 a.m.

LiveData Protocol Server fails to properly handle requests for WSDL files

2007-05-0300:00:00
www.kb.cert.org
12

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.148 Low

EPSS

Percentile

95.8%

Overview

The LiveData Protocol Server fails to properly handle requests. This vulnerability may allow a remote attacker to execute arbitrary code.

Description

The LiveData Protocol Server is real-time data acquisition and processing software used to record and transmit data among process control networks in SCADA environment. A vulnerability exists in the way LiveData Protocol Server handles requests for Web Services Description Language (WSDL) files that may allow a remote attacker to execute arbitrary code. According to iDefense Security Advisory 05.02.07:

By supplying a specially crafted request to the service on port 8080, an attacker is able to supply a negative length value to a strncpy call. This value is interpreted by strncpy as a very large positive value. As a result, a memory access violation occurs when attempting to write data past the end of the heap memory segment.
Note that this affects versions of LiveData Protocol Server through 5.00.045.


Impact

A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service.


Solution

Update
LiveData has released updates to address this issue. See the LiveData downloads website for updated versions.


Block or restrict access

Block or restrict access to the LiveData Protocol Server (8080/tcp) from untrusted networks such as the internet.


Vendor Information

213516

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

LiveData Inc. __ Affected

Updated: May 03, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Refer to the LiveData downloads website for updated versions.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23213516 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported in iDefense Security Advisory 05.02.07.

This document was written by Chris Taschner.

Other Information

CVE IDs: CVE-2007-2489
Severity Metric: 13.47 Date Public:

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.148 Low

EPSS

Percentile

95.8%