Microsys PROMOTIC Project File Handling Use-after-free Remote Code Execution

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.

Synopsis :

The remote host has a SCADA application that is affected by a remote
code execution vulnerability.

Description :

The installed version of Microsys PROMOTIC on the remote host is
earlier than 8.1.7. As such, it has a use-after-free vulnerability
that can be triggered by a specially crafted .pra project file.

By tricking a victim into opening a specially crafted .pra file, a
remote attacker can execute arbitrary code subject to the user's

See also :


Solution :

Upgrade to Microsys PROMOTIC 8.1.7 or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 58797 ()

Bugtraq ID: 52988

CVE ID: CVE-2011-4874

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now