var-201201-0266
Vulnerability from variot
Multiple buffer overflows in the (1) GUIControls, (2) BatchObjSrv, and (3) BatchSecCtrl ActiveX controls in Invensys Wonderware InBatch 9.0 and 9.0 SP1, and InBatch 8.1 SP1, 9.0 SP2, and 9.5 Server and Runtime Clients, allow remote attackers to execute arbitrary code via a long string in a property value, a different issue than CVE-2011-3141. Invensys Wonderware InBatch Server and runtime client (1) GUIControls , (2) BatchObjSrv ,and (3) BatchSecCtrl ActiveX The control contains a buffer overflow vulnerability. This vulnerability CVE-2011-3141 Is a different vulnerability.A third party may execute arbitrary code through an excessively long string of property values. Multiple stack-based buffer overflow vulnerabilities exist in Invensys Wonderware inBatch. An attacker could exploit this vulnerability to execute arbitrary code in the context of an application that uses ActiveX controls (usually Internet Explorer), which could result in a denial of service. Failed exploit attempts will result in a denial-of-service condition. Failure to do so may result in a denial of service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201201-0266", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wonderware inbatch", "scope": "eq", "trust": 3.3, "vendor": "invensys", "version": "9.5" }, { "model": "wonderware inbatch", "scope": "eq", "trust": 2.7, "vendor": "invensys", "version": "9.0" }, { "model": "wonderware inbatch", "scope": "eq", "trust": 1.9, "vendor": "invensys", "version": "8.1" }, { "model": null, "scope": "eq", "trust": 1.2, "vendor": "wonderware inbatch", "version": "9.0" }, { "model": "wonderware inbatch", "scope": "eq", "trust": 0.8, "vendor": "invensys", "version": "8.1 sp1" }, { "model": "wonderware inbatch", "scope": "eq", "trust": 0.8, "vendor": "invensys", "version": "9.0 sp1" }, { "model": "wonderware inbatch", "scope": "eq", "trust": 0.8, "vendor": "invensys", "version": "9.0 sp2" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "wonderware inbatch", "version": "8.1" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "wonderware inbatch", "version": "9.5" }, { "model": "wonderware inbatch sp2", "scope": "eq", "trust": 0.3, "vendor": "invensys", "version": "9.0" }, { "model": "wonderware inbatch sp1", "scope": "eq", "trust": 0.3, "vendor": "invensys", "version": "9.0" }, { "model": "wonderware inbatch sp1", "scope": "ne", "trust": 0.3, "vendor": "invensys", "version": "9.5" }, { "model": "wonderware inbatch sp1", "scope": "ne", "trust": 0.3, "vendor": "invensys", "version": "8.1" } ], "sources": [ { "db": "IVD", "id": "7d7340de-463f-11e9-9481-000c29342cb1" }, { "db": "IVD", "id": "3d641ee0-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5603" }, { "db": "BID", "id": "51129" }, { "db": "JVNDB", "id": "JVNDB-2012-001032" }, { "db": "CNNVD", "id": "CNNVD-201112-380" }, { "db": "NVD", "id": "CVE-2011-4870" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:invensys:wonderware_inbatch", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001032" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kuang-Chun Hung of the Security Research and Service Institute-Information and Communication Security Technology Center", "sources": [ { "db": "BID", "id": "51129" }, { "db": "CNNVD", "id": "CNNVD-201112-380" } ], "trust": 0.9 }, "cve": "CVE-2011-4870", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2011-4870", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2011-5603", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "7d7340de-463f-11e9-9481-000c29342cb1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "3d641ee0-2354-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-52815", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-4870", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-4870", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2011-5603", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201112-380", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "7d7340de-463f-11e9-9481-000c29342cb1", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "3d641ee0-2354-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-52815", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7d7340de-463f-11e9-9481-000c29342cb1" }, { "db": "IVD", "id": "3d641ee0-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5603" }, { "db": "VULHUB", "id": "VHN-52815" }, { "db": "JVNDB", "id": "JVNDB-2012-001032" }, { "db": "CNNVD", "id": "CNNVD-201112-380" }, { "db": "NVD", "id": "CVE-2011-4870" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple buffer overflows in the (1) GUIControls, (2) BatchObjSrv, and (3) BatchSecCtrl ActiveX controls in Invensys Wonderware InBatch 9.0 and 9.0 SP1, and InBatch 8.1 SP1, 9.0 SP2, and 9.5 Server and Runtime Clients, allow remote attackers to execute arbitrary code via a long string in a property value, a different issue than CVE-2011-3141. Invensys Wonderware InBatch Server and runtime client (1) GUIControls , (2) BatchObjSrv ,and (3) BatchSecCtrl ActiveX The control contains a buffer overflow vulnerability. This vulnerability CVE-2011-3141 Is a different vulnerability.A third party may execute arbitrary code through an excessively long string of property values. Multiple stack-based buffer overflow vulnerabilities exist in Invensys Wonderware inBatch. An attacker could exploit this vulnerability to execute arbitrary code in the context of an application that uses ActiveX controls (usually Internet Explorer), which could result in a denial of service. Failed exploit attempts will result in a denial-of-service condition. Failure to do so may result in a denial of service", "sources": [ { "db": "NVD", "id": "CVE-2011-4870" }, { "db": "JVNDB", "id": "JVNDB-2012-001032" }, { "db": "CNVD", "id": "CNVD-2011-5603" }, { "db": "BID", "id": "51129" }, { "db": "IVD", "id": "7d7340de-463f-11e9-9481-000c29342cb1" }, { "db": "IVD", "id": "3d641ee0-2354-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-52815" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-4870", "trust": 3.8 }, { "db": "BID", "id": "51129", "trust": 2.6 }, { "db": "ICS CERT", "id": "ICSA-11-332-01A", "trust": 2.5 }, { "db": "CNNVD", "id": "CNNVD-201112-380", "trust": 1.1 }, { "db": "CNVD", "id": "CNVD-2011-5603", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2012-001032", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-11-332-01", "trust": 0.3 }, { "db": "IVD", "id": "7D7340DE-463F-11E9-9481-000C29342CB1", "trust": 0.2 }, { "db": "IVD", "id": "3D641EE0-2354-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-52815", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d7340de-463f-11e9-9481-000c29342cb1" }, { "db": "IVD", "id": "3d641ee0-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5603" }, { "db": "VULHUB", "id": "VHN-52815" }, { "db": "BID", "id": "51129" }, { "db": "JVNDB", "id": "JVNDB-2012-001032" }, { "db": "CNNVD", "id": "CNNVD-201112-380" }, { "db": "NVD", "id": "CVE-2011-4870" } ] }, "id": "VAR-201201-0266", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7d7340de-463f-11e9-9481-000c29342cb1" }, { "db": "IVD", "id": "3d641ee0-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5603" }, { "db": "VULHUB", "id": "VHN-52815" } ], "trust": 1.7102693333333336 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "7d7340de-463f-11e9-9481-000c29342cb1" }, { "db": "IVD", "id": "3d641ee0-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5603" } ] }, "last_update_date": "2024-11-23T22:08:59.313000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://global.wonderware.com" }, { "title": "Wonderware \u65e5\u672c\u306e\u30d1\u30fc\u30c8\u30ca\u30fc", "trust": 0.8, "url": "http://global.wonderware.com/JP/Pages/JpPartnersSI.aspx" }, { "title": "Wonderware Top Page", "trust": 0.8, "url": "http://global.wonderware.com/JP/pages/default.aspx" }, { "title": "Invensys Wonderware inBatch \\342\\200\\230ActiveX\\342\\200\\231 Control Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/35885" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5603" }, { "db": "JVNDB", "id": "JVNDB-2012-001032" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-52815" }, { "db": "JVNDB", "id": "JVNDB-2012-001032" }, { "db": "NVD", "id": "CVE-2011-4870" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-332-01a.pdf" }, { "trust": 2.3, "url": "http://www.securityfocus.com/bid/51129" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4870" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4870" }, { "trust": 0.3, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-332-01.pdf" }, { "trust": 0.3, "url": "http://support.microsoft.com/kb/240797" }, { "trust": 0.3, "url": "http://global.wonderware.com/en/pages/default.aspx" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-5603" }, { "db": "VULHUB", "id": "VHN-52815" }, { "db": "BID", "id": "51129" }, { "db": "JVNDB", "id": "JVNDB-2012-001032" }, { "db": "CNNVD", "id": "CNNVD-201112-380" }, { "db": "NVD", "id": "CVE-2011-4870" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7d7340de-463f-11e9-9481-000c29342cb1" }, { "db": "IVD", "id": "3d641ee0-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-5603" }, { "db": "VULHUB", "id": "VHN-52815" }, { "db": "BID", "id": "51129" }, { "db": "JVNDB", "id": "JVNDB-2012-001032" }, { "db": "CNNVD", "id": "CNNVD-201112-380" }, { "db": "NVD", "id": "CVE-2011-4870" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-12-22T00:00:00", "db": "IVD", "id": "7d7340de-463f-11e9-9481-000c29342cb1" }, { "date": "2011-12-22T00:00:00", "db": "IVD", "id": "3d641ee0-2354-11e6-abef-000c29c66e3d" }, { "date": "2011-12-22T00:00:00", "db": "CNVD", "id": "CNVD-2011-5603" }, { "date": "2012-01-08T00:00:00", "db": "VULHUB", "id": "VHN-52815" }, { "date": "2011-12-20T00:00:00", "db": "BID", "id": "51129" }, { "date": "2012-01-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001032" }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-380" }, { "date": "2012-01-08T00:55:02.130000", "db": "NVD", "id": "CVE-2011-4870" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-12-22T00:00:00", "db": "CNVD", "id": "CNVD-2011-5603" }, { "date": "2012-01-09T00:00:00", "db": "VULHUB", "id": "VHN-52815" }, { "date": "2012-01-04T16:50:00", "db": "BID", "id": "51129" }, { "date": "2012-01-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001032" }, { "date": "2011-12-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201112-380" }, { "date": "2024-11-21T01:33:09.807000", "db": "NVD", "id": "CVE-2011-4870" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201112-380" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Invensys Wonderware InBatch of ActiveX Control buffer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001032" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "7d7340de-463f-11e9-9481-000c29342cb1" }, { "db": "IVD", "id": "3d641ee0-2354-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201112-380" } ], "trust": 1.0 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.