var-201412-0559
Vulnerability from variot
Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8514 and CVE-2014-9188. NOTE: this may be clarified later based on details provided by researchers. This vulnerability CVE-2014-8514 and CVE-2014-9188 Is a different vulnerability. The details of this issue may become clear in the future based on information provided by researchers.A third party may execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the MetaDraw ActiveX control's ObjectOverlappedBy method. The control dereferences an attacker-supplied memory address and redirects execution flow to the resulting address. An attacker can exploit this condition to achieve code execution under the context of the browser process. Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. Failed exploit attempts will likely result in denial-of-service conditions. ProClima 6.0.1 and prior are vulnerable. Schneider Electric ProClima is a set of thermal calculation software from Schneider Electric, France
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "proclima", "scope": "lte", "trust": 1.0, "vendor": "schneider electric", "version": "6.0.1" }, { "_id": null, "model": "proclima", "scope": "lt", "trust": 0.8, "vendor": "schneider electric", "version": "6.1.7" }, { "_id": null, "model": "proclima", "scope": null, "trust": 0.7, "vendor": "schneider electric", "version": null }, { "_id": null, "model": "electric proclima", "scope": "lt", "trust": 0.6, "vendor": "schneider", "version": "6.0.1" }, { "_id": null, "model": "proclima", "scope": "eq", "trust": 0.6, "vendor": "schneider electric", "version": "6.0.1" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "proclima", "version": "*" } ], "sources": [ { "db": "IVD", "id": "ae319f92-2351-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-15-001" }, { "db": "CNVD", "id": "CNVD-2014-09017" }, { "db": "JVNDB", "id": "JVNDB-2014-007422" }, { "db": "CNNVD", "id": "CNNVD-201412-571" }, { "db": "NVD", "id": "CVE-2014-8513" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:schneider_electric:proclima", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-007422" } ] }, "credits": { "_id": null, "data": "Andrea Micalizzi (rgod)", "sources": [ { "db": "ZDI", "id": "ZDI-15-001" } ], "trust": 0.7 }, "cve": "CVE-2014-8513", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2014-8513", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 2.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2014-09017", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "ae319f92-2351-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-76458", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-8513", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2014-8513", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2014-8513", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2014-09017", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201412-571", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "ae319f92-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-76458", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "ae319f92-2351-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-15-001" }, { "db": "CNVD", "id": "CNVD-2014-09017" }, { "db": "VULHUB", "id": "VHN-76458" }, { "db": "JVNDB", "id": "JVNDB-2014-007422" }, { "db": "CNNVD", "id": "CNNVD-201412-571" }, { "db": "NVD", "id": "CVE-2014-8513" } ] }, "description": { "_id": null, "data": "Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8514 and CVE-2014-9188. NOTE: this may be clarified later based on details provided by researchers. This vulnerability CVE-2014-8514 and CVE-2014-9188 Is a different vulnerability. The details of this issue may become clear in the future based on information provided by researchers.A third party may execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the MetaDraw ActiveX control\u0027s ObjectOverlappedBy method. The control dereferences an attacker-supplied memory address and redirects execution flow to the resulting address. An attacker can exploit this condition to achieve code execution under the context of the browser process. Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. Failed exploit attempts will likely result in denial-of-service conditions. \nProClima 6.0.1 and prior are vulnerable. Schneider Electric ProClima is a set of thermal calculation software from Schneider Electric, France", "sources": [ { "db": "NVD", "id": "CVE-2014-8513" }, { "db": "JVNDB", "id": "JVNDB-2014-007422" }, { "db": "ZDI", "id": "ZDI-15-001" }, { "db": "CNVD", "id": "CNVD-2014-09017" }, { "db": "BID", "id": "71707" }, { "db": "IVD", "id": "ae319f92-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-76458" } ], "trust": 3.33 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2014-8513", "trust": 4.3 }, { "db": "ICS CERT", "id": "ICSA-14-350-01", "trust": 2.5 }, { "db": "BID", "id": "71707", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201412-571", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2014-09017", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-007422", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-2480", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-15-001", "trust": 0.7 }, { "db": "IVD", "id": "AE319F92-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-76458", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "ae319f92-2351-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-15-001" }, { "db": "CNVD", "id": "CNVD-2014-09017" }, { "db": "VULHUB", "id": "VHN-76458" }, { "db": "BID", "id": "71707" }, { "db": "JVNDB", "id": "JVNDB-2014-007422" }, { "db": "CNNVD", "id": "CNNVD-201412-571" }, { "db": "NVD", "id": "CVE-2014-8513" } ] }, "id": "VAR-201412-0559", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "ae319f92-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-09017" }, { "db": "VULHUB", "id": "VHN-76458" } ], "trust": 1.9 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "ae319f92-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-09017" } ] }, "last_update_date": "2024-11-23T22:22:58.043000Z", "patch": { "_id": null, "data": [ { "title": "ProClima Software Vulnerability Disclosure", "trust": 0.8, "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-344-01" }, { "title": "Schneider Electric has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-350-01" }, { "title": "Patch for Schneider Electric ProClima Remote Buffer Overflow Vulnerability (CNVD-2014-09017)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/52954" }, { "title": "ProClima_v6.1.8_setup", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=53033" } ], "sources": [ { "db": "ZDI", "id": "ZDI-15-001" }, { "db": "CNVD", "id": "CNVD-2014-09017" }, { "db": "JVNDB", "id": "JVNDB-2014-007422" }, { "db": "CNNVD", "id": "CNNVD-201412-571" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-76458" }, { "db": "JVNDB", "id": "JVNDB-2014-007422" }, { "db": "NVD", "id": "CVE-2014-8513" } ] }, "references": { "_id": null, "data": [ { "trust": 3.2, "url": "https://ics-cert.us-cert.gov/advisories/icsa-14-350-01" }, { "trust": 1.7, "url": "http://download.schneider-electric.com/files?p_doc_ref=sevd%202014-344-01" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8513" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8513" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/71707" }, { "trust": 0.3, "url": "http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true" } ], "sources": [ { "db": "ZDI", "id": "ZDI-15-001" }, { "db": "CNVD", "id": "CNVD-2014-09017" }, { "db": "VULHUB", "id": "VHN-76458" }, { "db": "BID", "id": "71707" }, { "db": "JVNDB", "id": "JVNDB-2014-007422" }, { "db": "CNNVD", "id": "CNNVD-201412-571" }, { "db": "NVD", "id": "CVE-2014-8513" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "ae319f92-2351-11e6-abef-000c29c66e3d", "ident": null }, { "db": "ZDI", "id": "ZDI-15-001", "ident": null }, { "db": "CNVD", "id": "CNVD-2014-09017", "ident": null }, { "db": "VULHUB", "id": "VHN-76458", "ident": null }, { "db": "BID", "id": "71707", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2014-007422", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201412-571", "ident": null }, { "db": "NVD", "id": "CVE-2014-8513", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2014-12-19T00:00:00", "db": "IVD", "id": "ae319f92-2351-11e6-abef-000c29c66e3d", "ident": null }, { "date": "2015-01-07T00:00:00", "db": "ZDI", "id": "ZDI-15-001", "ident": null }, { "date": "2014-12-19T00:00:00", "db": "CNVD", "id": "CNVD-2014-09017", "ident": null }, { "date": "2014-12-27T00:00:00", "db": "VULHUB", "id": "VHN-76458", "ident": null }, { "date": "2014-12-10T00:00:00", "db": "BID", "id": "71707", "ident": null }, { "date": "2015-01-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-007422", "ident": null }, { "date": "2014-12-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201412-571", "ident": null }, { "date": "2014-12-27T15:59:02.777000", "db": "NVD", "id": "CVE-2014-8513", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2015-01-07T00:00:00", "db": "ZDI", "id": "ZDI-15-001", "ident": null }, { "date": "2014-12-22T00:00:00", "db": "CNVD", "id": "CNVD-2014-09017", "ident": null }, { "date": "2014-12-29T00:00:00", "db": "VULHUB", "id": "VHN-76458", "ident": null }, { "date": "2015-01-12T01:02:00", "db": "BID", "id": "71707", "ident": null }, { "date": "2015-01-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-007422", "ident": null }, { "date": "2015-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201412-571", "ident": null }, { "date": "2024-11-21T02:19:13.723000", "db": "NVD", "id": "CVE-2014-8513", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201412-571" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Schneider Electric ProClima of MDraw30.ocx of ActiveX Control buffer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-007422" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "ae319f92-2351-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201412-571" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.