Ecava IntegraXor Path Subversion Arbitrary DLL Injection Code Execution

high Nessus Plugin ID 55026

Synopsis

The remote Windows host contains a SCADA application that allows arbitrary code execution.

Description

The version of IntegraXor installed on the remote host is earlier than 3.60 (Build 4081). As such, it reportedly uses a fixed path to look for specific files or libraries, such as for 'dwmapi.dll', and this path includes directories that may not be trusted or under user control.

If a malicious DLL with the same name as a required DLL is located in the application's current working directory, the malicious DLL will be loaded.

Solution

Upgrade to version 3.60.4081.0 or later.

See Also

https://docs.microsoft.com/en-us/windows/desktop/Dlls/dynamic-link-library-security

http://www.acrossecurity.com/aspr/ASPR-2010-08-18-1-PUB.txt

http://www.nessus.org/u?c1cd860d

Plugin Details

Severity: High

ID: 55026

File Name: scada_integraxor_3_60_4081.nbin

Version: 1.66

Type: local

Family: SCADA

Published: 6/9/2011

Updated: 3/19/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SCADA/Apps/Ecava/IntegraXor/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/17/2011

Vulnerability Publication Date: 12/22/2010

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-4599

BID: 45549

ICS-ALERT: 11-147-01A