Vulnerabilites related to invensys - wonderware_archestra_integrated_development_environment
CVE-2010-2974 (GCVE-0-2010-2974)
Vulnerability from cvelistv5
Published
2010-08-05 19:00
Modified
2024-09-17 03:43
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:55:45.509Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#703189",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/703189"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MORO-87MHPT"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-08-05T19:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#703189",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/703189"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MORO-87MHPT"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-2974",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#703189",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/703189"
            },
            {
              "name": "http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108",
              "refsource": "CONFIRM",
              "url": "http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108"
            },
            {
              "name": "https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm",
              "refsource": "CONFIRM",
              "url": "https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MORO-87MHPT",
              "refsource": "CONFIRM",
              "url": "http://www.kb.cert.org/vuls/id/MORO-87MHPT"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-2974",
    "datePublished": "2010-08-05T19:00:00Z",
    "dateReserved": "2010-08-05T00:00:00Z",
    "dateUpdated": "2024-09-17T03:43:16.392Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2010-08-05 19:17
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_archestra_configuration_access_component_activex_control:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B08B61E8-62EF-46B0-8881-300A02E911F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:invensys:infusion_integrated_engineering_environment:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9294B6B1-7D7C-461B-ADC1-D90251FADB96",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_application_server:*:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "C53D322C-1D42-479E-9225-40684655F4CA",
              "versionEndIncluding": "3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_application_server:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "68FA27FB-6AA3-4E6F-83EB-066DAF0BD3A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_application_server:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B64216A-3D05-4384-8B35-845974B99128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_application_server:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5EA5956-AFFF-4AF6-8E51-60B702E4E3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_application_server:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA9909E3-C0C3-4EE8-A592-948D8F90E569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_application_server:3.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "2576F8F1-DA43-47E1-95D9-9A9233FCD2B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:invensys:wonderware_archestra_integrated_development_environment:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C0CE9E0-61A4-4D92-BB3F-4437E77E27CE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en la interfaz IConfigurationAccess en el control ActiveX Invensys Wonderware Archestra ConfigurationAccessComponent de Wonderware Application Server (WAS) anterior a v3.1 SP2 P01, como el usado en el Wonderware Archestra Integrated Development Environment (IDE) y el InFusion Integrated Engineering Environment (IEE), permite a los atacantes remotos ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s del primer argumento del m\u00e9todo UnsubscribeData."
    }
  ],
  "evaluatorSolution": "Per: http://www.kb.cert.org/vuls/id/703189\r\n\r\n\u0027According to Invensys, users that are using IAS 2.1 (all versions)-IDE, WAS 3.0 (all versions)-IDE, WAS 3.1 (all versions)-IDE, InFusion CE 2.0-IEE, InFusion FE 1.0 (all versions)-IEE, InFusion FE 2.0-IEE, InFusion SCADA 2.0\u2013IEE should apply the vendor security update. This vulnerability is not present in Wonderware Application Server 3.1 Service Pack 2 Patch 01 (WAS 3.1 SP2 P01).\u0027",
  "id": "CVE-2010-2974",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-08-05T19:17:55.543",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/703189"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.kb.cert.org/vuls/id/MORO-87MHPT"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/703189"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.kb.cert.org/vuls/id/MORO-87MHPT"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}