Moxa Device Manager Tool MDM2_Gateway Response Remote Overflow

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

The remote host contains an application that is affected by a buffer
overflow vulnerability.

Description :

The remote Windows host has a version earlier than 2.3 of the Moxa
Device Manager (MDM) Tool, used for managing embedded industrial
control systems across the Internet. Such versions are affected by a
buffer overflow vulnerability that can be triggered using a specially
crafted MDM2_Gateway response.

If an attacker can trick a user into connecting with the affected
application to a malicious gateway, he can leverage this issue to
execute arbitrary code on the affected host, subject to the user's
privileges.

See also :

http://www.nessus.org/u?aff59b59
http://www.us-cert.gov/control_systems/pdf/ICS-Alert-10-293-02.pdf
http://www.moxa.com/support/download.aspx?d_id=2669

Solution :

Upgrade to Moxa Device Manager Tool 2.3 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 52051 ()

Bugtraq ID: 46156

CVE ID: CVE-2010-4741