Advantech Studio ISSymbol ActiveX Control Multiple Buffer Overflow Vulnerabilities

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is affected by
multiple buffer overflow vulnerabilities.

Description :

The remote Windows host is running a version of Advantech's ISSymbol
(ISSymbol.ocx) ActiveX control that is affected by multiple buffer
overflow vulnerabilities. These vulnerabilities can be exploited to
execute arbitrary code via long values for the 'InternationalOrder',
'InternationalSeparator', or 'LogFileName' properties; or by a long
'bstrFileName' argument on the 'OpenScreen()' method.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-12-155/
http://www.zerodayinitiative.com/advisories/ZDI-12-168/
http://seclists.org/fulldisclosure/2012/Aug/276
http://seclists.org/fulldisclosure/2012/Aug/344
http://www.nessus.org/u?ef59308d
http://www.indusoft.com/hotfixes/hotfixes.php

Solution :

Follow the vendor's advisory to apply a hotfix.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 60084 ()

Bugtraq ID: 47596

CVE ID: CVE-2011-0340

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now