首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Siemens Tecnomatix FactoryLink 8.0.1.1473 Multiple Vulnerabilities
来源:http://aluigi.org 作者:Luigi 发布时间:2011-03-23  

Sources:
http://aluigi.org/adv/factorylink_1-adv.txt
http://aluigi.org/adv/factorylink_2-adv.txt
http://aluigi.org/adv/factorylink_3-adv.txt
http://aluigi.org/adv/factorylink_4-adv.txt
http://aluigi.org/adv/factorylink_5-adv.txt
http://aluigi.org/adv/factorylink_6-adv.txt

Advisory Archive: http://www.exploit-db.com/sploits/siemens_factory_link_adv.tar.gz
PoC Archive: http://www.exploit-db.com/sploits/siemens_factory_link_poc.tar.gz

#######################################################################

                             Luigi Auriemma

Application:  Siemens Tecnomatix FactoryLink
              http://www.usdata.com/sea/FactoryLink/en/p_nav1.html
              http://www.plm.automation.siemens.com/en_us/products/tecnomatix/production_management/factorylink/index.shtml
Versions:     <= 8.0.1.1473
Date:         21 Mar 2011 (found 02 Jan 2011)
Author:       Luigi Auriemma
              e-mail: aluigi@autistici.org
              web:    aluigi.org
#######################################################################

===============
Introduction
===============

From vendor's website:
"Siemens FactoryLink monitors, supervises, and controls industrial
processes by enabling customers to perfect their processes and
products. Built on an advanced open architecture, FactoryLink delivers
the highest performance and flexibility to customers building vertical
applications in a wide range of industries.
Highly scaleable, FactoryLink can be used to build virtually any size
application, from the simplest Human-Machine Interface (HMI) systems to
the most complex and demanding Supervisory Control and Data Acquisition
(SCADA) systems."

Remote Stack Overflow:

======
Bug
======
CSService is a Windows service listening on port 7580.

The logging function is vulnerable to a buffer-overflow caused by the
usage of vsprintf with a stack buffer of 1024 bytes.
The vulnerability can be exploited from remote in various ways like the
passing of a big path or filter string in the file related operations
(opcodes 6, 8 and 10).

===========
The Code
===========


http://aluigi.org/poc/factorylink_x.zip
http://www.exploit-db.com/sploits/factorylink_x.zip

  factorylink_x 3 SERVER

#######################################################################

Arbitrary Files Reading and Listing:

======
Bug
======

CSService is a Windows service listening on port 7580.

All the file operations used by the service (opcodes 6, 8 and 10) allow
to specify arbitrary files and directories (absolute paths) and it's
possible for an attacker to download any remote file on the server.
Obviously it's possible also to specify directory traversal paths.

#######################################################################

===========
The Code
===========


http://aluigi.org/poc/factorylink_x.zip
http://www.exploit-db.com/sploits/factorylink_x.zip

for downloading c:\boot.ini
  factorylink_x 4 SERVER

for viewing the list of files in c:\
  factorylink_x 5 SERVER

#######################################################################

Remote Memory Corruption:

======
Bug
======

vrn.exe is a server listening on port 7579 when a project is started.

There is a particular function used to parse the text fields located in
the strings of the opcode 10.
It copies the string delimited by a ';' or a space in the stack buffer
provided by the callee function causing a stack overflow that allows a
certain control on the code flow (for example the changing of the lower
8bit of the return address or another exception).

#######################################################################

===========
The Code
===========

http://aluigi.org/poc/factorylink_3.zip
http://www.exploit-db.com/sploits/factorylink_3.zip

  nc SERVER 7579 < factorylink_3.dat

#######################################################################

Remote Stack Overflow:

======
Bug
======


vrn.exe is a server listening on port 7579 when a project is started.

There is a particular function used to parse the text fields located in
the strings of the opcode 9.
It copies the string delimited by a ';' or a space in the stack buffer
provided by the callee function causing a classical stack overflow.

#######################################################################

===========
The Code
===========

http://aluigi.org/poc/factorylink_4.zip
http://www.exploit-db.com/sploits/factorylink_4.zip

  nc SERVER 7579 < factorylink_4.dat

#######################################################################

Arbitrary File Download:

======
Bug
======

vrn.exe is a server listening on port 7579 when a project is started.

The opcode 8 can be used to download any arbitrary file on the system
by specifiying the full path (UNC too) or directory traversal.

#######################################################################

===========
The Code
===========

http://aluigi.org/poc/factorylink_5.zip
http://www.exploit-db.com/sploits/factorylink_5.zip

download c:\boot.ini
  nc SERVER 7579 < factorylink_5.dat

#######################################################################

======
Bug
======

CSService, connsrv and datasrv are various Windows services.

All these services are vulneable to some Denial of Service
vulnerabilities that allow to crash them due to NULL pointer
dereferences, stack exaustions and raised exceptions.

#######################################################################

===========
The Code
===========

http://aluigi.org/poc/factorylink_x.zip
http://www.exploit-db.com/sploits/factorylink_x.zip

  factorylink_x 1 SERVER
  factorylink_x 2 SERVER
  factorylink_x 6 SERVER
  factorylink_x 7 SERVER

#######################################################################

======
Fix
======

No fix.

#######################################################################


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Iconics GENESIS32 and GENESIS6
·Audio Editor Pro 5.0 Buffer Ov
·7-Technologies IGSS 9.00.00.11
·Novell Netware 6.5 SP8 Remote
·DATAC RealWin Multiple Vulnera
·Symantec LiveUpdate Administra
·SpoonFTP 1.2 RETR Denial of Se
·Adobe Flash Player AVM Bytecod
·Novell Netware NWFTPD.NLM DELE
·HP OpenView NNM nnmRptConfig n
·RealPlayer <= 14.0.1.633 Heap
·HP NNM CGI webappmon.exe OvJav
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved