The LiveData Protocol Server fails to properly handle requests. This vulnerability may allow a remote attacker to execute arbitrary code.
The LiveData Protocol Server is real-time data acquisition and processing software used to record and transmit data among process control networks in SCADA environment. A vulnerability exists in the way LiveData Protocol Server handles requests for Web Services Description Language (WSDL) files that may allow a remote attacker to execute arbitrary code. According to iDefense Security Advisory 05.02.07:
By supplying a specially crafted request to the service on port 8080, an attacker is able to supply a negative length value to a strncpy call. This value is interpreted by strncpy as a very large positive value. As a result, a memory access violation occurs when attempting to write data past the end of the heap memory segment.
Note that this affects versions of LiveData Protocol Server through 5.00.045.
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service.
LiveData has released updates to address this issue. See the LiveData downloads website for updated versions.
Block or restrict access
Block or restrict access to the LiveData Protocol Server (8080/tcp) from untrusted networks such as the internet.
Vendor| Status| Date Notified| Date Updated
LiveData Inc.| | -| 03 May 2007
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
This vulnerability was reported in iDefense Security Advisory 05.02.07.
This document was written by Chris Taschner.