Advantech Studio ISSymbol ActiveX Control Multiple Buffer Overflow Vulnerabilities

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is affected by
multiple buffer overflow vulnerabilities.

Description :

The remote Windows host is running a version of Advantech's ISSymbol
(ISSymbol.ocx) ActiveX control that is affected by multiple buffer
overflow vulnerabilities. These vulnerabilities can be exploited to
execute arbitrary code via long values for the 'InternationalOrder',
'InternationalSeparator', or 'LogFileName' properties
or by a long
'bstrFileName' argument on the 'OpenScreen()' method.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-12-155/
http://www.zerodayinitiative.com/advisories/ZDI-12-168/
http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0276.html
http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0344.html
http://www.nessus.org/u?ef59308d
http://www.indusoft.com/hotfixes/hotfixes.php

Solution :

Follow the vendor's advisory to apply a hotfix.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 60084 ()

Bugtraq ID: 47596

CVE ID: CVE-2011-0340