Advantech Studio ISSymbol ActiveX Control Multiple Buffer Overflow Vulnerabilities

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is affected by
multiple buffer overflow vulnerabilities.

Description :

The remote Windows host is running a version of Advantech's ISSymbol
(ISSymbol.ocx) ActiveX control that is affected by multiple buffer
overflow vulnerabilities. These vulnerabilities can be exploited to
execute arbitrary code via long values for the 'InternationalOrder',
'InternationalSeparator', or 'LogFileName' properties
or by a long
'bstrFileName' argument on the 'OpenScreen()' method.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-12-155/
http://www.zerodayinitiative.com/advisories/ZDI-12-168/
http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0276.html
http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0344.html
http://www.nessus.org/u?ef59308d
http://www.indusoft.com/hotfixes/hotfixes.php

Solution :

Follow the vendor's advisory to apply a hotfix.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 60084 ()

Bugtraq ID: 47596

CVE ID: CVE-2011-0340

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial