Lucene search

K
nessusTenable9011.PRM
HistoryNov 24, 2015 - 12:00 a.m.

IniNet Solutions SCADA Web Server < 2.02.0000

2015-11-2400:00:00
Tenable
www.tenable.com
9

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.013 Low

EPSS

Percentile

85.9%

The remote host is running the IniNet Solutions SCADA Web Server that is subject to the following vulnerabilities :

  • An overflow condition exists in an unspecified function. The issue is triggered as user-supplied input is not properly validated when handling multiple fields in HTTP requests. This may allow a remote attacker to cause a stack-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code. (CVE-2015-1001)
  • A flaw exists that is triggered when handling input that has been URL encoded. This may allow an unauthorized attacker to make changes to arbitrary files. (CVE-2015-1002)
  • A flaw exists that allows traversing outside of a restricted path. The issue is due to the progam not properly sanitizing user input, specifically path traversal style attacks (e.g. ‘…/’). With a specially crafted request, a remote attacker can gain access to arbitrary files. (CVE-2015-1003)
Binary data 9011.prm
VendorProductVersionCPE
ininet_solutions_gmbhininet_scada_web_servercpe:/a:ininet_solutions_gmbh:ininet_scada_web_server

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.013 Low

EPSS

Percentile

85.9%

Related for 9011.PRM