var-201403-0444
Vulnerability from variot
The PLC driver in ServerMain.exe in the Kepware KepServerEX 4 component in Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R2 build 71.4165, 2010 R2.1 build 71.4325, 2010 R3 build 72.4560, 2010 R3.1 build 72.4644, 2013 R1 build 73.4729, 2013 R1.1 build 73.4832, 2013 R1.1a build 73.4903, 2013 R1.2 build 73.4955, and 2013 R2 build 74.5094 allows remote attackers to cause a denial of service (application crash) via a crafted OPF file (aka project file). This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider-Electric ClearSCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of OPF files. The issue lies in a failure to validate a length specifier before using it as an index into an array. An attacker can leverage this vulnerability to execute code under the context of the current process. Schneider Electric ClearSCADA is an open software platform that enables remote management of critical architectures. Schneider ClearSCADA has security holes in the implementation of parsing project files. To exploit this vulnerability you need to install the \"PLC Driver\". Schneider Electric ClearSCADA is prone to a remote code-execution vulnerability. Failed exploit attempts may result in a denial-of-service condition. 1a build 73.4903, 2013 R1.2 build 73.4955, 2013 R2 build 74.5094
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201403-0444", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "clearscada", "scope": "eq", "trust": 1.6, "vendor": "aveva", "version": "2013" }, { "model": null, "scope": "eq", "trust": 1.0, "vendor": "clearscada", "version": "2013" }, { "model": "clearscada", "scope": "eq", "trust": 1.0, "vendor": "aveva", "version": "2010" }, { "model": null, "scope": "eq", "trust": 0.8, "vendor": "clearscada", "version": "2010" }, { "model": "clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2010 r2 (build 71.4165)" }, { "model": "clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2010 r2.1 (build 71.4325)" }, { "model": "clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2010 r3 (build 72.4560)" }, { "model": "clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2010 r3.1 (build 72.4644)" }, { "model": "scada expert clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2013 r1 (build 73.4729)" }, { "model": "scada expert clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2013 r1.1 (build 73.4832)" }, { "model": "scada expert clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2013 r1.1a (build 73.4903)" }, { "model": "scada expert clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2013 r1.2 (build 73.4955)" }, { "model": "scada expert clearscada", "scope": "eq", "trust": 0.8, "vendor": "schneider electric", "version": "2013 r2 (build 74.5094)" }, { "model": "clearscada", "scope": null, "trust": 0.7, "vendor": "schneider electric", "version": null }, { "model": "electric clearscada", "scope": "eq", "trust": 0.6, "vendor": "schneider", "version": "2013" }, { "model": "electric clearscada", "scope": "eq", "trust": 0.6, "vendor": "schneider", "version": "2010" }, { "model": "clearscada", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "2010" }, { "model": "scada expert clearscada", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "2013" } ], "sources": [ { "db": "IVD", "id": "285fdc02-2352-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-14-059" }, { "db": "CNVD", "id": "CNVD-2014-01024" }, { "db": "JVNDB", "id": "JVNDB-2014-001653" }, { "db": "CNNVD", "id": "CNNVD-201403-250" }, { "db": "NVD", "id": "CVE-2014-0779" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:schneider_electric:clearscada", "vulnerable": true }, { "cpe22Uri": "cpe:/a:schneider_electric:scada_expert_clearscada", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-001653" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Andrew Brooks", "sources": [ { "db": "ZDI", "id": "ZDI-14-059" }, { "db": "BID", "id": "65476" } ], "trust": 1.0 }, "cve": "CVE-2014-0779", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2014-0779", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 2.5, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2014-01024", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "285fdc02-2352-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-68272", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-0779", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2014-0779", "trust": 0.8, "value": "Medium" }, { "author": "ZDI", "id": "CVE-2014-0779", "trust": 0.7, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2014-01024", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201403-250", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "285fdc02-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-68272", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "285fdc02-2352-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-14-059" }, { "db": "CNVD", "id": "CNVD-2014-01024" }, { "db": "VULHUB", "id": "VHN-68272" }, { "db": "JVNDB", "id": "JVNDB-2014-001653" }, { "db": "CNNVD", "id": "CNNVD-201403-250" }, { "db": "NVD", "id": "CVE-2014-0779" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The PLC driver in ServerMain.exe in the Kepware KepServerEX 4 component in Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R2 build 71.4165, 2010 R2.1 build 71.4325, 2010 R3 build 72.4560, 2010 R3.1 build 72.4644, 2013 R1 build 73.4729, 2013 R1.1 build 73.4832, 2013 R1.1a build 73.4903, 2013 R1.2 build 73.4955, and 2013 R2 build 74.5094 allows remote attackers to cause a denial of service (application crash) via a crafted OPF file (aka project file). This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider-Electric ClearSCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of OPF files. The issue lies in a failure to validate a length specifier before using it as an index into an array. An attacker can leverage this vulnerability to execute code under the context of the current process. Schneider Electric ClearSCADA is an open software platform that enables remote management of critical architectures. Schneider ClearSCADA has security holes in the implementation of parsing project files. To exploit this vulnerability you need to install the \\\"PLC Driver\\\". Schneider Electric ClearSCADA is prone to a remote code-execution vulnerability. Failed exploit attempts may result in a denial-of-service condition. 1a build 73.4903, 2013 R1.2 build 73.4955, 2013 R2 build 74.5094", "sources": [ { "db": "NVD", "id": "CVE-2014-0779" }, { "db": "JVNDB", "id": "JVNDB-2014-001653" }, { "db": "ZDI", "id": "ZDI-14-059" }, { "db": "CNVD", "id": "CNVD-2014-01024" }, { "db": "BID", "id": "65476" }, { "db": "IVD", "id": "285fdc02-2352-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-68272" } ], "trust": 3.33 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-0779", "trust": 4.3 }, { "db": "ICS CERT", "id": "ICSA-14-072-01", "trust": 2.5 }, { "db": "BID", "id": "65476", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201403-250", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2014-01024", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-001653", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1876", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-14-059", "trust": 0.7 }, { "db": "IVD", "id": "285FDC02-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-68272", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "285fdc02-2352-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-14-059" }, { "db": "CNVD", "id": "CNVD-2014-01024" }, { "db": "VULHUB", "id": "VHN-68272" }, { "db": "BID", "id": "65476" }, { "db": "JVNDB", "id": "JVNDB-2014-001653" }, { "db": "CNNVD", "id": "CNNVD-201403-250" }, { "db": "NVD", "id": "CVE-2014-0779" } ] }, "id": "VAR-201403-0444", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "285fdc02-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-01024" }, { "db": "VULHUB", "id": "VHN-68272" } ], "trust": 1.9 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "285fdc02-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-01024" } ] }, "last_update_date": "2024-11-23T21:55:26.874000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SEVD 2014-024-01", "trust": 0.8, "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-024-01" }, { "title": "Schneider Electric has issued an update to correct this vulnerability.", "trust": 0.7, "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-072-01" } ], "sources": [ { "db": "ZDI", "id": "ZDI-14-059" }, { "db": "JVNDB", "id": "JVNDB-2014-001653" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-68272" }, { "db": "JVNDB", "id": "JVNDB-2014-001653" }, { "db": "NVD", "id": "CVE-2014-0779" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-072-01" }, { "trust": 1.7, "url": "http://download.schneider-electric.com/files?p_doc_ref=sevd%202014-024-01" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0779" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0779" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/65476" }, { "trust": 0.3, "url": "http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true" } ], "sources": [ { "db": "ZDI", "id": "ZDI-14-059" }, { "db": "CNVD", "id": "CNVD-2014-01024" }, { "db": "VULHUB", "id": "VHN-68272" }, { "db": "BID", "id": "65476" }, { "db": "JVNDB", "id": "JVNDB-2014-001653" }, { "db": "CNNVD", "id": "CNNVD-201403-250" }, { "db": "NVD", "id": "CVE-2014-0779" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "285fdc02-2352-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-14-059" }, { "db": "CNVD", "id": "CNVD-2014-01024" }, { "db": "VULHUB", "id": "VHN-68272" }, { "db": "BID", "id": "65476" }, { "db": "JVNDB", "id": "JVNDB-2014-001653" }, { "db": "CNNVD", "id": "CNNVD-201403-250" }, { "db": "NVD", "id": "CVE-2014-0779" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-02-18T00:00:00", "db": "IVD", "id": "285fdc02-2352-11e6-abef-000c29c66e3d" }, { "date": "2014-04-03T00:00:00", "db": "ZDI", "id": "ZDI-14-059" }, { "date": "2014-02-18T00:00:00", "db": "CNVD", "id": "CNVD-2014-01024" }, { "date": "2014-03-14T00:00:00", "db": "VULHUB", "id": "VHN-68272" }, { "date": "2014-01-24T00:00:00", "db": "BID", "id": "65476" }, { "date": "2014-03-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-001653" }, { "date": "2014-03-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201403-250" }, { "date": "2014-03-14T10:55:05.803000", "db": "NVD", "id": "CVE-2014-0779" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-04-03T00:00:00", "db": "ZDI", "id": "ZDI-14-059" }, { "date": "2014-02-18T00:00:00", "db": "CNVD", "id": "CNVD-2014-01024" }, { "date": "2018-12-31T00:00:00", "db": "VULHUB", "id": "VHN-68272" }, { "date": "2015-03-19T09:33:00", "db": "BID", "id": "65476" }, { "date": "2014-03-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-001653" }, { "date": "2014-03-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201403-250" }, { "date": "2024-11-21T02:02:47.440000", "db": "NVD", "id": "CVE-2014-0779" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201403-250" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Schneider Electric StruxureWare SCADA Expert ClearSCADA of Kepware KepServerEX 4 Component ServerMain.exe Inside PLC Service disruption in drivers (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-001653" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "285fdc02-2352-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201403-250" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.