Interactive Graphical SCADA System ODBC Server Buffer Overflow Vulnerability
2011-08-18T00:00:00
ID OPENVAS:802241 Type openvas Reporter Copyright (C) 2011 Greenbone Networks GmbH Modified 2017-09-01T00:00:00
Description
This host is installed with Interactive Graphical SCADA System
and is prone to buffer overflow vulnerability.
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_igss_odbc_server_bof_vuln.nasl 7044 2017-09-01 11:50:59Z teissa $
#
# Interactive Graphical SCADA System ODBC Server Buffer Overflow Vulnerability
#
# Authors:
# Sooraj KS <kssooraj@secpod.com>
#
# Copyright:
# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
tag_impact = "Successful exploitation could allow remote attackers to execute arbitrary
code with with administrative privileges. Failed exploit attempts will
result in a denial-of-service condition.
Impact Level: System/Application";
tag_affected = "7T Interactive Graphical SCADA System (IGSS) versions prior to 9.0.0.11143";
tag_insight = "The flaw is caused by a memory corruption error in the Open Database
Connectivity (ODBC) component when processing packets sent to TCP port 20222.";
tag_solution = "Apply the patch from below link,
http://www.7t.dk/igss/igssupdates/v90/progupdatesv90.zip";
tag_summary = "This host is installed with Interactive Graphical SCADA System
and is prone to buffer overflow vulnerability.";
if(description)
{
script_id(802241);
script_version("$Revision: 7044 $");
script_tag(name:"last_modification", value:"$Date: 2017-09-01 13:50:59 +0200 (Fri, 01 Sep 2017) $");
script_tag(name:"creation_date", value:"2011-08-18 14:57:45 +0200 (Thu, 18 Aug 2011)");
script_cve_id("CVE-2011-2959");
script_bugtraq_id(47960);
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_name("Interactive Graphical SCADA System ODBC Server Buffer Overflow Vulnerability");
script_xref(name : "URL" , value : "http://secunia.com/advisories/44345/");
script_xref(name : "URL" , value : "http://seclists.org/bugtraq/2011/May/168");
script_xref(name : "URL" , value : "http://www.securityfocus.com/archive/1/518110");
script_tag(name:"qod_type", value:"executable_version");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2011 Greenbone Networks GmbH");
script_family("Buffer overflow");
script_dependencies("gb_igss_detect.nasl");
script_require_keys("IGSS/Win/Ver");
script_tag(name : "impact" , value : tag_impact);
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
exit(0);
}
include("smb_nt.inc");
include("version_func.inc");
include("secpod_smb_func.inc");
## Get version from KB
version = get_kb_item("IGSS/Win/Ver");
if(! version){
exit(0);
}
## Check for IGSS versions prior to 9.0
if(version_is_less(version:version, test_version:"9.0"))
{
security_message(0);
exit(0);
}
## Check for IGSS Patch
if(version =~ "^9\.0\.*")
{
## Get ODBC Server Path
key = "SOFTWARE\7-Technologies\IGSS32\v9.00.00\ENVIRONMENT";
if(!registry_key_exists(key:key)){
exit(0);
}
odbcPath = registry_get_sz(key:key, item:"IGSSWORK");
if(! odbcPath){
exit(0);
}
## Get Version from Odbcixv9se.exe
odbcVer = fetch_file_version(sysPath:odbcPath, file_name:"Odbcixv9se.exe");
if(! odbcVer){
exit(0);
}
## Check for IGSS ODBC versions prior to 9.0.0.11143
if(version_is_less(version:version, test_version:"9.0.0.11143")) {
security_message(0);
}
}
{"id": "OPENVAS:802241", "type": "openvas", "bulletinFamily": "scanner", "title": "Interactive Graphical SCADA System ODBC Server Buffer Overflow Vulnerability", "description": "This host is installed with Interactive Graphical SCADA System\n and is prone to buffer overflow vulnerability.", "published": "2011-08-18T00:00:00", "modified": "2017-09-01T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=802241", "reporter": "Copyright (C) 2011 Greenbone Networks GmbH", "references": ["http://secunia.com/advisories/44345/", "http://www.securityfocus.com/archive/1/518110", "http://seclists.org/bugtraq/2011/May/168"], "cvelist": ["CVE-2011-2959"], "lastseen": "2017-09-04T14:20:12", "viewCount": 0, "enchantments": {"score": {"value": 9.1, "vector": "NONE", "modified": "2017-09-04T14:20:12", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2011-2959"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310802241"]}], "modified": "2017-09-04T14:20:12", "rev": 2}, "vulnersScore": 9.1}, "pluginID": "802241", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_igss_odbc_server_bof_vuln.nasl 7044 2017-09-01 11:50:59Z teissa $\n#\n# Interactive Graphical SCADA System ODBC Server Buffer Overflow Vulnerability\n#\n# Authors:\n# Sooraj KS <kssooraj@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation could allow remote attackers to execute arbitrary\n code with with administrative privileges. Failed exploit attempts will\n result in a denial-of-service condition.\n Impact Level: System/Application\";\ntag_affected = \"7T Interactive Graphical SCADA System (IGSS) versions prior to 9.0.0.11143\";\ntag_insight = \"The flaw is caused by a memory corruption error in the Open Database\n Connectivity (ODBC) component when processing packets sent to TCP port 20222.\";\ntag_solution = \"Apply the patch from below link,\n http://www.7t.dk/igss/igssupdates/v90/progupdatesv90.zip\";\ntag_summary = \"This host is installed with Interactive Graphical SCADA System\n and is prone to buffer overflow vulnerability.\";\n\nif(description)\n{\n script_id(802241);\n script_version(\"$Revision: 7044 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-09-01 13:50:59 +0200 (Fri, 01 Sep 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-18 14:57:45 +0200 (Thu, 18 Aug 2011)\");\n script_cve_id(\"CVE-2011-2959\");\n script_bugtraq_id(47960);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Interactive Graphical SCADA System ODBC Server Buffer Overflow Vulnerability\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/44345/\");\n script_xref(name : \"URL\" , value : \"http://seclists.org/bugtraq/2011/May/168\");\n script_xref(name : \"URL\" , value : \"http://www.securityfocus.com/archive/1/518110\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2011 Greenbone Networks GmbH\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"gb_igss_detect.nasl\");\n script_require_keys(\"IGSS/Win/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\n## Get version from KB\nversion = get_kb_item(\"IGSS/Win/Ver\");\nif(! version){\n exit(0);\n}\n\n## Check for IGSS versions prior to 9.0\nif(version_is_less(version:version, test_version:\"9.0\"))\n{\n security_message(0);\n exit(0);\n}\n\n## Check for IGSS Patch\nif(version =~ \"^9\\.0\\.*\")\n{\n ## Get ODBC Server Path\n key = \"SOFTWARE\\7-Technologies\\IGSS32\\v9.00.00\\ENVIRONMENT\";\n if(!registry_key_exists(key:key)){\n exit(0);\n }\n\n odbcPath = registry_get_sz(key:key, item:\"IGSSWORK\");\n if(! odbcPath){\n exit(0);\n }\n\n ## Get Version from Odbcixv9se.exe\n odbcVer = fetch_file_version(sysPath:odbcPath, file_name:\"Odbcixv9se.exe\");\n if(! odbcVer){\n exit(0);\n }\n\n ## Check for IGSS ODBC versions prior to 9.0.0.11143\n if(version_is_less(version:version, test_version:\"9.0.0.11143\")) {\n security_message(0);\n }\n}\n", "naslFamily": "Buffer overflow"}
{"cve": [{"lastseen": "2020-12-09T19:39:09", "description": "Stack-based buffer overflow in the Open Database Connectivity (ODBC) service (Odbcixv9se.exe) in 7-Technologies Interactive Graphical SCADA System (IGSS) 9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet to TCP port 22202.", "edition": 5, "cvss3": {}, "published": "2011-07-29T19:55:00", "title": "CVE-2011-2959", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-2959"], "modified": "2011-08-01T04:00:00", "cpe": ["cpe:/a:7t:igss:3.0", "cpe:/a:7t:igss:5.0", "cpe:/a:7t:igss:6", "cpe:/a:7t:igss:8", "cpe:/a:7t:igss:4.1", "cpe:/a:7t:igss:2.0", "cpe:/a:7t:igss:9", "cpe:/a:7t:igss:5.1", "cpe:/a:7t:igss:7"], "id": "CVE-2011-2959", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2959", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:7t:igss:7:*:*:*:*:*:*:*", "cpe:2.3:a:7t:igss:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:7t:igss:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:7t:igss:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:7t:igss:9:*:*:*:*:*:*:*", "cpe:2.3:a:7t:igss:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:7t:igss:8:*:*:*:*:*:*:*", "cpe:2.3:a:7t:igss:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:7t:igss:6:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2020-04-27T19:22:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-2959"], "description": "This host is installed with Interactive Graphical SCADA System\n and is prone to buffer overflow vulnerability.", "modified": "2020-04-23T00:00:00", "published": "2011-08-18T00:00:00", "id": "OPENVAS:1361412562310802241", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310802241", "type": "openvas", "title": "Interactive Graphical SCADA System ODBC Server Buffer Overflow Vulnerability", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Interactive Graphical SCADA System ODBC Server Buffer Overflow Vulnerability\n#\n# Authors:\n# Sooraj KS <kssooraj@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.802241\");\n script_version(\"2020-04-23T08:43:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-04-23 08:43:39 +0000 (Thu, 23 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2011-08-18 14:57:45 +0200 (Thu, 18 Aug 2011)\");\n script_cve_id(\"CVE-2011-2959\");\n script_bugtraq_id(47960);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Interactive Graphical SCADA System ODBC Server Buffer Overflow Vulnerability\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/44345/\");\n script_xref(name:\"URL\", value:\"http://seclists.org/bugtraq/2011/May/168\");\n script_xref(name:\"URL\", value:\"http://www.securityfocus.com/archive/1/518110\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2011 Greenbone Networks GmbH\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"gb_igss_detect.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"IGSS/Win/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow remote attackers to execute arbitrary\n code with with administrative privileges. Failed exploit attempts will\n result in a denial-of-service condition.\");\n script_tag(name:\"affected\", value:\"7T Interactive Graphical SCADA System (IGSS) versions prior to 9.0.0.11143\");\n script_tag(name:\"insight\", value:\"The flaw is caused by a memory corruption error in the Open Database\n Connectivity (ODBC) component when processing packets sent to TCP port 20222.\");\n script_tag(name:\"solution\", value:\"Apply the patch from the referenced advisory.\");\n script_tag(name:\"summary\", value:\"This host is installed with Interactive Graphical SCADA System\n and is prone to buffer overflow vulnerability.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://www.7t.dk/igss/igssupdates/v90/progupdatesv90.zip\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nversion = get_kb_item(\"IGSS/Win/Ver\");\nif(! version){\n exit(0);\n}\n\nif(version_is_less(version:version, test_version:\"9.0\"))\n{\n report = report_fixed_ver(installed_version:version, fixed_version:\"9.0\");\n security_message(port: 0, data: report);\n exit(0);\n}\n\nif(version =~ \"^9\\.0\\.*\")\n{\n key = \"SOFTWARE\\7-Technologies\\IGSS32\\v9.00.00\\ENVIRONMENT\";\n if(!registry_key_exists(key:key)){\n exit(0);\n }\n\n odbcPath = registry_get_sz(key:key, item:\"IGSSWORK\");\n if(! odbcPath){\n exit(0);\n }\n\n odbcVer = fetch_file_version(sysPath:odbcPath, file_name:\"Odbcixv9se.exe\");\n if(! odbcVer){\n exit(0);\n }\n\n if(version_is_less(version:version, test_version:\"9.0.0.11143\")) {\n report = report_fixed_ver(installed_version:version, fixed_version:\"9.0.0.11143\", install_path:odbcPath);\n security_message(port: 0, data: report);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}