LiveData Protocol Server fails to properly handle requests for WSDL files

ID VU:213516
Type cert
Reporter CERT
Modified 2008-07-21T18:18:00



The LiveData Protocol Server fails to properly handle requests. This vulnerability may allow a remote attacker to execute arbitrary code.


The LiveData Protocol Server is real-time data acquisition and processing software used to record and transmit data among process control networks in SCADA environment. A vulnerability exists in the way LiveData Protocol Server handles requests for Web Services Description Language (WSDL) files that may allow a remote attacker to execute arbitrary code. According to iDefense Security Advisory 05.02.07:

By supplying a specially crafted request to the service on port 8080, an attacker is able to supply a negative length value to a strncpy call. This value is interpreted by strncpy as a very large positive value. As a result, a memory access violation occurs when attempting to write data past the end of the heap memory segment.
Note that this affects versions of LiveData Protocol Server through 5.00.045.


A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service.


LiveData has released updates to address this issue. See the LiveData downloads website for updated versions.

Block or restrict access

Block or restrict access to the LiveData Protocol Server (8080/tcp) from untrusted networks such as the internet.

Vendor Information


Filter by status: All Affected Not Affected Unknown

Filter by content: __ Vendor has issued information

__ Sort by: Status Alphabetical

Expand all

Affected Unknown __ Unaffected

Javascript is disabled. Click here to view vendors.

__ LiveData Inc.

Updated: May 03, 2007


__ Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


Refer to the LiveData downloads website for updated versions.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A


  • <>
  • <>
  • <>


This vulnerability was reported in iDefense Security Advisory 05.02.07

This document was written by Chris Taschner.

Other Information

CVE IDs: | CVE-2007-2489
Severity Metric:** | 13.47
Date Public:
| 2007-05-02
Date First Published: | 2007-05-03
Date Last Updated: | 2008-07-21 18:18 UTC
Document Revision: | 17