Lucene search

K
certCERTVU:476345
HistoryJun 11, 2008 - 12:00 a.m.

Citect CitectSCADA ODBC service buffer overflow

2008-06-1100:00:00
www.kb.cert.org
30

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.822 High

EPSS

Percentile

98.4%

Overview

Citect CitectSCADA contains a remotely accessible buffer overflow vulnerability which may allow a remote attacker to execute arbitrary code.

Description

Citect CitectSCADA is software used for monitoring and control in Supervisory Control And Data Acquisition (SCADA) systems. A buffer overflow vulnerability exists in the CitectSCADA ODBC service. The ODBC Server listens on the network (20222/tcp) for service requests from clients. An attacker could exploit this vulnerability by sending specially crafted packets to a vulnerable CitectSCADA system. According to Core Security Technologies Advisory:

_Due to a lack of a proper length checking of the read data, a memory copy operation that uses as destination a buffer of fixed size allocated in the stack can be overflowed allowing an un-authenticated attacker to execute arbitrary code on vulnerable systems._Note that this vulnerability affects versions of Citect CitectSCADA and CitectFacilities. Exploit code for this vulnerability is publicly available.

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service.


Solution

Apply a patch

Supported Citect customers should contact Citect to receive a patch. For more information on contacting Citect visit http://www.citect.com/index.php?option=com_content&task=view&id=1374&Itemid=223.


Restrict access

Restricting access to a vulnerable system by using host or network based firewalls may prevent a remote attacker from exploiting this vulnerability. For more information refer to Citect security article Securing Your SCADA Network.

Restricting access may result in loss of ODBC Server connectivity. According to Core Security Technologies Advisory:

The vulnerability is located in the ODBC server service, vulnerable organizations that do not require ODBC connectivity may disable the service with no adverse effects to the CitectSCADA software. Installations that require ODBC connectivity to SQL databases, spreadsheets, etc. will suffer loss of connection with ODBC data sources if this workaround is applied. Vulnerable organizations should obtain positive verification that ODBC connectivity is not necessary in their installation and prepare appropriate contingency procedures before the workaround is applied.

Vendor Information

476345

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Citect __ Affected

Notified: April 14, 2008 Updated: October 06, 2008

Status

Affected

Vendor Statement

Citect advises supported customers concerned about this reported issue to contact Citect Global Support Centre for related security advice and to receive the patch if required. Customers can navigate to http://www.citect.com/index.php?option=com_content&task=view&id=1374&Itemid=223 for advice on how to contact Support via telephone, facsimile, email or the Web portal.

Vendor Information

See also <http://www.citect.com/documents/news_and_media/pr-citect-address-security.pdf&gt; and http://knowledgebase.citect.com/SafetyandSecurity/.

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Ivan Arce at Core Securities for information that was used in this report.

This document was written by Chris Taschner.

Other Information

CVE IDs: CVE-2008-2639
Severity Metric: 7.35 Date Public:

References

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.822 High

EPSS

Percentile

98.4%