var-201307-0318
Vulnerability from variot
Multiple buffer overflows in CimWebServer.exe in the WebView component in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY before 8.0 SIM 27, 8.1 before SIM 25, and 8.2 before SIM 19, and Proficy Process Systems with CIMPLICITY, allow remote attackers to execute arbitrary code via crafted data in packets to TCP port 10212, aka ZDI-CAN-1621 and ZDI-CAN-1624. GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY and Proficy Process Systems with CIMPLICITY of WebView Component CimWebServer.exe Contains a buffer overflow vulnerability. Zero Day Initiative The vulnerability ZDI-CAN-1621 and ZDI-CAN-1624 It was announced as.By a third party TCP port 10212 Arbitrary code may be executed via crafted data in the packet to the. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GE Proficy CIMPLICITY. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CimWebServer component. This component performs insufficient bounds checking on user-supplied data passed in the szPassword field which results in stack corruption. An attacker can leverage this situation to execute code under the context of the process. GE Proficy CIMPLICITY is a monitoring software developed by GE and one of the industry's leading HMI/SCADA software
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "proficy cimplicity", "scope": null, "trust": 2.0, "vendor": "ge", "version": null }, { "_id": null, "model": "intelligent platforms proficy process systems with cimplicity", "scope": "eq", "trust": 1.6, "vendor": "ge", "version": null }, { "_id": null, "model": "intelligent platforms proficy hmi\\/scada cimplicity", "scope": "eq", "trust": 1.6, "vendor": "ge", "version": "8.1" }, { "_id": null, "model": "intelligent platforms proficy hmi\\/scada cimplicity", "scope": "eq", "trust": 1.6, "vendor": "ge", "version": "8.0" }, { "_id": null, "model": "intelligent platforms proficy hmi\\/scada cimplicity", "scope": "eq", "trust": 1.6, "vendor": "ge", "version": "8.2" }, { "_id": null, "model": "proficy hmi/scada - cimplicity", "scope": "eq", "trust": 0.8, "vendor": "general electric", "version": "sim 19" }, { "_id": null, "model": "proficy hmi/scada - cimplicity", "scope": "lt", "trust": 0.8, "vendor": "general electric", "version": "8.2" }, { "_id": null, "model": "proficy hmi/scada - cimplicity", "scope": "eq", "trust": 0.8, "vendor": "general electric", "version": "sim 25" }, { "_id": null, "model": "proficy hmi/scada - cimplicity", "scope": "lt", "trust": 0.8, "vendor": "general electric", "version": "8.1" }, { "_id": null, "model": "proficy process systems with cimplicity", "scope": null, "trust": 0.8, "vendor": "general electric", "version": null }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "intelligent platforms proficy hmi scada cimplicity", "version": "8.0" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "intelligent platforms proficy hmi scada cimplicity", "version": "8.1" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "intelligent platforms proficy hmi scada cimplicity", "version": "8.2" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "intelligent platforms proficy process with cimplicity", "version": null } ], "sources": [ { "db": "IVD", "id": "ce8baf5c-2352-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-180" }, { "db": "ZDI", "id": "ZDI-13-181" }, { "db": "CNVD", "id": "CNVD-2013-11048" }, { "db": "JVNDB", "id": "JVNDB-2013-003613" }, { "db": "CNNVD", "id": "CNNVD-201307-646" }, { "db": "NVD", "id": "CVE-2013-2785" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:ge:intelligent_platforms_proficy_hmi%2Fscada_cimplicity", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ge:intelligent_platforms_proficy_process_systems_with_cimplicity", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003613" } ] }, "credits": { "_id": null, "data": "ZombiE and amisto0x07", "sources": [ { "db": "ZDI", "id": "ZDI-13-180" }, { "db": "ZDI", "id": "ZDI-13-181" }, { "db": "BID", "id": "61469" }, { "db": "CNNVD", "id": "CNNVD-201307-646" } ], "trust": 2.3 }, "cve": "CVE-2013-2785", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2013-2785", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2013-2785", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2013-2785", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2013-11048", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "ce8baf5c-2352-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-2785", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-2785", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2013-2785", "trust": 0.7, "value": "MEDIUM" }, { "author": "ZDI", "id": "CVE-2013-2785", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2013-11048", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201307-646", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "ce8baf5c-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "ce8baf5c-2352-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-180" }, { "db": "ZDI", "id": "ZDI-13-181" }, { "db": "CNVD", "id": "CNVD-2013-11048" }, { "db": "JVNDB", "id": "JVNDB-2013-003613" }, { "db": "CNNVD", "id": "CNNVD-201307-646" }, { "db": "NVD", "id": "CVE-2013-2785" } ] }, "description": { "_id": null, "data": "Multiple buffer overflows in CimWebServer.exe in the WebView component in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY before 8.0 SIM 27, 8.1 before SIM 25, and 8.2 before SIM 19, and Proficy Process Systems with CIMPLICITY, allow remote attackers to execute arbitrary code via crafted data in packets to TCP port 10212, aka ZDI-CAN-1621 and ZDI-CAN-1624. GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY and Proficy Process Systems with CIMPLICITY of WebView Component CimWebServer.exe Contains a buffer overflow vulnerability. Zero Day Initiative The vulnerability ZDI-CAN-1621 and ZDI-CAN-1624 It was announced as.By a third party TCP port 10212 Arbitrary code may be executed via crafted data in the packet to the. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GE Proficy CIMPLICITY. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CimWebServer component. This component performs insufficient bounds checking on user-supplied data passed in the szPassword field which results in stack corruption. An attacker can leverage this situation to execute code under the context of the process. GE Proficy CIMPLICITY is a monitoring software developed by GE and one of the industry\u0027s leading HMI/SCADA software", "sources": [ { "db": "NVD", "id": "CVE-2013-2785" }, { "db": "JVNDB", "id": "JVNDB-2013-003613" }, { "db": "ZDI", "id": "ZDI-13-180" }, { "db": "ZDI", "id": "ZDI-13-181" }, { "db": "CNVD", "id": "CNVD-2013-11048" }, { "db": "BID", "id": "61469" }, { "db": "IVD", "id": "ce8baf5c-2352-11e6-abef-000c29c66e3d" } ], "trust": 3.87 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2013-2785", "trust": 4.9 }, { "db": "ICS CERT", "id": "ICSA-13-170-01", "trust": 2.4 }, { "db": "BID", "id": "61469", "trust": 1.5 }, { "db": "ZDI", "id": "ZDI-13-180", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2013-11048", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201307-646", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-003613", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1621", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1624", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-13-181", "trust": 0.7 }, { "db": "IVD", "id": "CE8BAF5C-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "ce8baf5c-2352-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-180" }, { "db": "ZDI", "id": "ZDI-13-181" }, { "db": "CNVD", "id": "CNVD-2013-11048" }, { "db": "BID", "id": "61469" }, { "db": "JVNDB", "id": "JVNDB-2013-003613" }, { "db": "CNNVD", "id": "CNNVD-201307-646" }, { "db": "NVD", "id": "CVE-2013-2785" } ] }, "id": "VAR-201307-0318", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "ce8baf5c-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-11048" } ], "trust": 1.3907204000000002 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "ce8baf5c-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-11048" } ] }, "last_update_date": "2024-08-14T15:24:49.373000Z", "patch": { "_id": null, "data": [ { "title": "KB15602", "trust": 2.2, "url": "http://support.ge-ip.com/support/index?page=kbchannel\u0026id=KB15602" }, { "title": "GE Proficy CIMPLICITY \u0027CimWebServer\u0027 patch for remote stack buffer overflow vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/36553" } ], "sources": [ { "db": "ZDI", "id": "ZDI-13-180" }, { "db": "ZDI", "id": "ZDI-13-181" }, { "db": "CNVD", "id": "CNVD-2013-11048" }, { "db": "JVNDB", "id": "JVNDB-2013-003613" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003613" }, { "db": "NVD", "id": "CVE-2013-2785" } ] }, "references": { "_id": null, "data": [ { "trust": 3.0, "url": "http://support.ge-ip.com/support/index?page=kbchannel\u0026id=kb15602" }, { "trust": 2.4, "url": "http://ics-cert.us-cert.gov/advisories/icsa-13-170-01" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2785" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2785" }, { "trust": 0.6, "url": "http://www.zerodayinitiative.com/advisories/zdi-13-180/" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/61469" } ], "sources": [ { "db": "ZDI", "id": "ZDI-13-180" }, { "db": "ZDI", "id": "ZDI-13-181" }, { "db": "CNVD", "id": "CNVD-2013-11048" }, { "db": "JVNDB", "id": "JVNDB-2013-003613" }, { "db": "CNNVD", "id": "CNNVD-201307-646" }, { "db": "NVD", "id": "CVE-2013-2785" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "ce8baf5c-2352-11e6-abef-000c29c66e3d", "ident": null }, { "db": "ZDI", "id": "ZDI-13-180", "ident": null }, { "db": "ZDI", "id": "ZDI-13-181", "ident": null }, { "db": "CNVD", "id": "CNVD-2013-11048", "ident": null }, { "db": "BID", "id": "61469", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2013-003613", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201307-646", "ident": null }, { "db": "NVD", "id": "CVE-2013-2785", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2013-07-31T00:00:00", "db": "IVD", "id": "ce8baf5c-2352-11e6-abef-000c29c66e3d", "ident": null }, { "date": "2013-07-26T00:00:00", "db": "ZDI", "id": "ZDI-13-180", "ident": null }, { "date": "2013-07-26T00:00:00", "db": "ZDI", "id": "ZDI-13-181", "ident": null }, { "date": "2013-07-31T00:00:00", "db": "CNVD", "id": "CNVD-2013-11048", "ident": null }, { "date": "2013-07-26T00:00:00", "db": "BID", "id": "61469", "ident": null }, { "date": "2013-08-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003613", "ident": null }, { "date": "2013-07-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-646", "ident": null }, { "date": "2013-07-31T13:20:28.707000", "db": "NVD", "id": "CVE-2013-2785", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2013-07-26T00:00:00", "db": "ZDI", "id": "ZDI-13-180", "ident": null }, { "date": "2013-07-26T00:00:00", "db": "ZDI", "id": "ZDI-13-181", "ident": null }, { "date": "2013-07-31T00:00:00", "db": "CNVD", "id": "CNVD-2013-11048", "ident": null }, { "date": "2013-07-26T00:00:00", "db": "BID", "id": "61469", "ident": null }, { "date": "2013-08-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003613", "ident": null }, { "date": "2013-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-646", "ident": null }, { "date": "2013-07-31T13:20:28.707000", "db": "NVD", "id": "CVE-2013-2785", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201307-646" } ], "trust": 0.6 }, "title": { "_id": null, "data": "GE Proficy CIMPLICITY \u0027CimWebServer\u0027 Remote Stack Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "ce8baf5c-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-11048" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "ce8baf5c-2352-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201307-646" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.