var-201506-0066
Vulnerability from variot
Stack-based buffer overflow in the OpenForIPCamTest method in the RTSPVIDEO.rtspvideoCtrl.1 (aka SStreamVideo) ActiveX control in Moxa SoftCMS before 1.3 allows remote attackers to execute arbitrary code via the StrRtspPath parameter. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the RTSPVIDEO.rtspvideoCtrl.1 ActiveX control. By passing an overly long string to the OpenForIPCamTest method's StrRtspPath parameter, an attacker can overflow a buffer on the stack. This vulnerability could be used to execute arbitrary code in the context of the browser. Moxa SoftCMS is a set of central management software developed by Moxa for large-scale monitoring systems. The software supports real-time video surveillance, video playback, and event management. Moxa SoftCMS is prone to a stack-based buffer-overflow vulnerability. Failed exploit attempts will result in denial-of-service conditions. Moxa SoftCMS 1.2 is vulnerable
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "softcms",
"scope": null,
"trust": 1.3,
"vendor": "moxa",
"version": null
},
{
"_id": null,
"model": "softcms",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"_id": null,
"model": "softcms",
"scope": "eq",
"trust": 0.9,
"vendor": "moxa",
"version": "1.2"
},
{
"_id": null,
"model": "softcms",
"scope": "lt",
"trust": 0.8,
"vendor": "moxa",
"version": "1.3"
},
{
"_id": null,
"model": "vport activex sdk plus",
"scope": null,
"trust": 0.7,
"vendor": "moxa",
"version": null
},
{
"_id": null,
"model": "softcms",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-120"
},
{
"db": "ZDI",
"id": "ZDI-15-391"
},
{
"db": "CNVD",
"id": "CNVD-2015-02382"
},
{
"db": "BID",
"id": "74966"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002947"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-107"
},
{
"db": "NVD",
"id": "CVE-2015-1000"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:moxa:softcms",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-002947"
}
]
},
"credits": {
"_id": null,
"data": "Ariele Caltabiano (kimiya)",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-120"
},
{
"db": "ZDI",
"id": "ZDI-15-391"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-107"
}
],
"trust": 2.0
},
"cve": "CVE-2015-1000",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-1000",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2015-1000",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 1.4,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-02382",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-78946",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "ZDI",
"id": "CVE-2015-1000",
"trust": 1.4,
"value": "HIGH"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2015-1000",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-1000",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2015-02382",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201504-107",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-78946",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-120"
},
{
"db": "ZDI",
"id": "ZDI-15-391"
},
{
"db": "CNVD",
"id": "CNVD-2015-02382"
},
{
"db": "VULHUB",
"id": "VHN-78946"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002947"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-107"
},
{
"db": "NVD",
"id": "CVE-2015-1000"
}
]
},
"description": {
"_id": null,
"data": "Stack-based buffer overflow in the OpenForIPCamTest method in the RTSPVIDEO.rtspvideoCtrl.1 (aka SStreamVideo) ActiveX control in Moxa SoftCMS before 1.3 allows remote attackers to execute arbitrary code via the StrRtspPath parameter. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the RTSPVIDEO.rtspvideoCtrl.1 ActiveX control. By passing an overly long string to the OpenForIPCamTest method\u0027s StrRtspPath parameter, an attacker can overflow a buffer on the stack. This vulnerability could be used to execute arbitrary code in the context of the browser. Moxa SoftCMS is a set of central management software developed by Moxa for large-scale monitoring systems. The software supports real-time video surveillance, video playback, and event management. Moxa SoftCMS is prone to a stack-based buffer-overflow vulnerability. Failed exploit attempts will result in denial-of-service conditions. \nMoxa SoftCMS 1.2 is vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-1000"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002947"
},
{
"db": "ZDI",
"id": "ZDI-15-120"
},
{
"db": "ZDI",
"id": "ZDI-15-391"
},
{
"db": "CNVD",
"id": "CNVD-2015-02382"
},
{
"db": "BID",
"id": "74966"
},
{
"db": "VULHUB",
"id": "VHN-78946"
}
],
"trust": 3.78
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2015-1000",
"trust": 4.8
},
{
"db": "ZDI",
"id": "ZDI-15-120",
"trust": 3.0
},
{
"db": "ICS CERT",
"id": "ICSA-15-153-02",
"trust": 2.5
},
{
"db": "BID",
"id": "74966",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002947",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-2519",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-2496",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-15-391",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201504-107",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-02382",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-78946",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-120"
},
{
"db": "ZDI",
"id": "ZDI-15-391"
},
{
"db": "CNVD",
"id": "CNVD-2015-02382"
},
{
"db": "VULHUB",
"id": "VHN-78946"
},
{
"db": "BID",
"id": "74966"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002947"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-107"
},
{
"db": "NVD",
"id": "CVE-2015-1000"
}
]
},
"id": "VAR-201506-0066",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02382"
},
{
"db": "VULHUB",
"id": "VHN-78946"
}
],
"trust": 1.28712118
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02382"
}
]
},
"last_update_date": "2024-11-23T22:22:54.854000Z",
"patch": {
"_id": null,
"data": [
{
"title": "SoftCMS",
"trust": 0.8,
"url": "http://www.moxa.com/product/SoftCMS.htm"
},
{
"title": "Moxa has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-097-01"
},
{
"title": "Moxa has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-153-02"
},
{
"title": "Patch for Moxa SoftCMS RTSPVIDEO.rtspvideoCtrl.1 ActiveX Stack Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/57249"
},
{
"title": "SoftCMS_Trial",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=56137"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-120"
},
{
"db": "ZDI",
"id": "ZDI-15-391"
},
{
"db": "CNVD",
"id": "CNVD-2015-02382"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002947"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-107"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-78946"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002947"
},
{
"db": "NVD",
"id": "CVE-2015-1000"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 3.2,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-15-153-02"
},
{
"trust": 1.7,
"url": "http://zerodayinitiative.com/advisories/zdi-15-120/"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/74966"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1000"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1000"
},
{
"trust": 0.7,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-15-097-01"
},
{
"trust": 0.6,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-120"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-120"
},
{
"db": "ZDI",
"id": "ZDI-15-391"
},
{
"db": "CNVD",
"id": "CNVD-2015-02382"
},
{
"db": "VULHUB",
"id": "VHN-78946"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002947"
},
{
"db": "CNNVD",
"id": "CNNVD-201504-107"
},
{
"db": "NVD",
"id": "CVE-2015-1000"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-15-120",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-15-391",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2015-02382",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-78946",
"ident": null
},
{
"db": "BID",
"id": "74966",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002947",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201504-107",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2015-1000",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2015-04-08T00:00:00",
"db": "ZDI",
"id": "ZDI-15-120",
"ident": null
},
{
"date": "2015-08-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-391",
"ident": null
},
{
"date": "2015-04-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-02382",
"ident": null
},
{
"date": "2015-06-05T00:00:00",
"db": "VULHUB",
"id": "VHN-78946",
"ident": null
},
{
"date": "2015-06-02T00:00:00",
"db": "BID",
"id": "74966",
"ident": null
},
{
"date": "2015-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-002947",
"ident": null
},
{
"date": "2015-04-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201504-107",
"ident": null
},
{
"date": "2015-06-05T10:59:02.287000",
"db": "NVD",
"id": "CVE-2015-1000",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2015-04-08T00:00:00",
"db": "ZDI",
"id": "ZDI-15-120",
"ident": null
},
{
"date": "2015-08-13T00:00:00",
"db": "ZDI",
"id": "ZDI-15-391",
"ident": null
},
{
"date": "2015-04-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-02382",
"ident": null
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-78946",
"ident": null
},
{
"date": "2015-11-03T19:03:00",
"db": "BID",
"id": "74966",
"ident": null
},
{
"date": "2015-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-002947",
"ident": null
},
{
"date": "2015-06-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201504-107",
"ident": null
},
{
"date": "2024-11-21T02:24:28.137000",
"db": "NVD",
"id": "CVE-2015-1000",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201504-107"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Moxa SoftCMS of RTSPVIDEO.rtspvideoCtrl.1 ActiveX Stack-based buffer overflow vulnerability in Control",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-002947"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201504-107"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.