Advisory Details

December 12th, 2014

Trihedral VTScada Integer Overflow Denial of Service Vulnerability

ZDI-14-425
ZDI-CAN-2599

CVE ID CVE-2014-9192
CVSS SCORE 7.8, AV:N/AC:L/Au:N/C:N/I:N/A:C
AFFECTED VENDORS Trihedral Engineering Ltd
AFFECTED PRODUCTS VTScada
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['2841']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to cause a denial of service to vulnerable installations of Trihedral VTScada. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the included HTTP server. By providing a small negative content length, an attacker is able to cause an integer overflow, resulting in the allocation of too small a buffer. The resulting heap overwrite will terminate the HTTP server.

ADDITIONAL DETAILS Trihedral Engineering Ltd has issued an update to correct this vulnerability. More details can be found at:
https://ics-cert.us-cert.gov/advisories/ICSA-14-343-02
DISCLOSURE TIMELINE
  • 2014-11-19 - Vulnerability reported to vendor
  • 2014-12-12 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES