Microsys PROMOTIC Project File Handling Use-after-free Remote Code Execution

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote host has a SCADA application that is affected by a remote
code execution vulnerability.

Description :

The installed version of Microsys PROMOTIC on the remote host is
earlier than 8.1.7. As such, it has a use-after-free vulnerability
that can be triggered by a specially crafted .pra project file.

By tricking a victim into opening a specially crafted .pra file, a
remote attacker can execute arbitrary code subject to the user's
privileges.

See also :

http://aluigi.altervista.org/adv/promotic_3-adv.txt
http://www.promotic.eu/en/pmdoc/News.htm#ver801057

Solution :

Upgrade to Microsys PROMOTIC 8.1.7 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 58797 ()

Bugtraq ID: 52988

CVE ID: CVE-2011-4874