CVE-2014-0753 (GCVE-0-2014-0753)
Vulnerability from cvelistv5
Published
2014-01-21 01:00
Modified
2025-08-25 23:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Stack-based buffer overflow in the SCADA server in Ecava IntegraXor before 4.1.4390 allows remote attackers to cause a denial of service (system crash) by triggering access to DLL code located in the IntegraXor directory.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ecava | IntegraXor |
Version: 0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:27:19.521Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "102171", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/102171" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-016-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "IntegraXor", "vendor": "Ecava", "versions": [ { "lessThanOrEqual": "4.1.4380", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Luigi Auriemma" } ], "datePublic": "2014-01-15T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eStack-based buffer overflow in the SCADA server in Ecava IntegraXor before 4.1.4390 allows remote attackers to cause a denial of service (system crash) by triggering access to DLL code located in the IntegraXor directory.\u003c/p\u003e" } ], "value": "Stack-based buffer overflow in the SCADA server in Ecava IntegraXor before 4.1.4390 allows remote attackers to cause a denial of service (system crash) by triggering access to DLL code located in the IntegraXor directory." } ], "metrics": [ { "cvssV2_0": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-25T23:46:30.088Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "102171", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/102171" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/" }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-016-01" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eEcava Sdn Bhd has issued a customer notification that details this \nvulnerability and provides mitigation guidance to its customers. Ecava \nSdn Bhd recommends users download and install the update, IntegraXor \nSCADA Server 4.1.4390, from their support Web site:\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://www.integraxor.com/download/rc.msi?4.1.4390\"\u003ehttp://www.integraxor.com/download/rc.msi?4.1.4390\u003c/a\u003e\u003c/p\u003e\u003cp\u003eFor additional information, please see Ecava\u2019s vulnerability note:\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/\"\u003ehttp://www.integraxor.com/blog/buffer-overflow-vulnerability-note/\u003c/a\u003e\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "Ecava Sdn Bhd has issued a customer notification that details this \nvulnerability and provides mitigation guidance to its customers. Ecava \nSdn Bhd recommends users download and install the update, IntegraXor \nSCADA Server 4.1.4390, from their support Web site:\n\n\n http://www.integraxor.com/download/rc.msi?4.1.4390 \n\nFor additional information, please see Ecava\u2019s vulnerability note:\n\n\n http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/" } ], "source": { "advisory": "ICSA-14-016-01", "discovery": "EXTERNAL" }, "title": "Ecava IntegraXor Stack-based Buffer Overflow", "x_generator": { "engine": "Vulnogram 0.2.0" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2014-0753", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the SCADA server in Ecava IntegraXor before 4.1.4390 allows remote attackers to cause a denial of service (system crash) by triggering access to DLL code located in the IntegraXor directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "102171", "refsource": "OSVDB", "url": "http://osvdb.org/102171" }, { "name": "http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/", "refsource": "CONFIRM", "url": "http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/" }, { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-016-01", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-016-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2014-0753", "datePublished": "2014-01-21T01:00:00", "dateReserved": "2014-01-02T00:00:00", "dateUpdated": "2025-08-25T23:46:30.088Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-0753\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2014-01-21T01:55:03.620\",\"lastModified\":\"2025-08-26T00:15:29.717\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in the SCADA server in Ecava IntegraXor before 4.1.4390 allows remote attackers to cause a denial of service (system crash) by triggering access to DLL code located in the IntegraXor directory.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer basado en pila en el servidor SCADA en Ecava IntegraXor anterior a 4.1.4390, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del sistema) mediante la activaci\u00f3n de acceso al c\u00f3digo DLL ubicado en el directorio IntegraXor.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.1.4380\",\"matchCriteriaId\":\"D4C53150-2600-425B-BACB-51111E97664F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:3.5.3900.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"024F3AE4-4912-4C4C-859E-3CC832123394\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:3.5.3900.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E4BEE8F-B1FC-47E0-BF7F-3247A29CCBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:3.6.4000.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0EB4452-4772-4CA9-A119-A8DFE183CB87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:3.60.4061:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66CE22B5-F6B1-4CA5-8975-A0DEA0272E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:3.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C338B7E-B958-4ED4-AF3C-B64A72CA01A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:3.71.4200:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6BE9299-0D5D-4FDF-8E5C-17EBB3E3D895\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:3.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4717F90-420C-40C1-B465-2052F5F5D8F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:4.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04D6E69A-AE18-4B23-95CA-85C605E5F23B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C254168-384E-4B0A-BB22-445D7281FAC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:4.1.4360:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0319EBA-C39F-4A3D-AF40-7A90FA016696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:4.1.4369:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA3EDD6-3459-4916-B184-271A43FAC10A\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/102171\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-14-016-01\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"http://ics-cert.us-cert.gov/advisories/ICSA-14-016-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://osvdb.org/102171\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…