{"vuid":"VU#190617","idnumber":"190617","name":"LiveData ICCP Server heap buffer overflow vulnerability","keywords":["LiveData","SCADA","PCN","buffer overflow","heap","LiveData ICCP Server","cssc","RFC 1006","TPKT"],"overview":"LiveData ICCP Server contains a heap-based  buffer overflow. This vulnerability may allow a remote attacker to crash the server.","clean_desc":"Inter-Control Center Communications Protocol (ICCP) According to the LiveData ICCP Server white paper: The Inter-Control Center Communications Protocol (ICCP) is being specified by utility organizations throughout the world to provide data exchange over wide area networks (WANs) between utility control centers, utilities, power pools, regional control centers, and Non-Utility Generators. ICCP is also an international standard: International Electrotechnical Commission (IEC) Telecontrol Application Service Element 2 (TASE.2). ISO Transport Service over TCP (TPKT, RFC 1006) RFC 1006 specifies how to run the OSI transport protocol on top of TCP/IP. In the layered protocol model, RFC 1006 is situated between the TCP and OSI transport layers. LiveData ICCP Server and LiveData Server LiveData ICCP Server records and transmits data to other control points in process control networks. According to the LiveData ICCP Server white paper: The LiveData ICCP Server is based on LiveData's standard off-the-shelf software product, LiveData Server, which features a rich set of integration methods that can be easily applied to new and existing SCADA/EMS/DCS systems. The Problem The LiveData implementation of RFC 1006 is vulnerable to a heap-based buffer overflow. By sending a specially crafted packet to a vulnerable LiveData RFC 1006 implementation, a remote attacker may be able to trigger the overflow.","impact":"This vulnerability may allow a remote, unauthenticated attacker to crash a LiveData ICCP Server.","resolution":"Upgrade \nThis issue is corrected in LiveData ICCP Server version 5.00.035.","workarounds":"","sysaffected":"","thanks":"Thanks to Matt Franz of \nDigital Bond Inc. for reporting this vulnerability. Information used in this document came from LiveData.","author":"This document was written by Jeff Gennari.","public":["http://livedata.com/utilities.html","http://www.ietf.org/rfc/rfc1006.txt","http://www.ietf.org/rfc/rfc2126.txt","http://www.livedata.com/docs/LiveData_ICCP_Server.pdf","http://secunia.com/advisories/20146/"],"cveids":["CVE-2006-0059"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-02-21T20:44:03Z","publicdate":"2006-05-16T00:00:00Z","datefirstpublished":"2006-05-16T19:45:03Z","dateupdated":"2008-09-22T22:14:42Z","revision":126,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"16","cam_population":"5","cam_impact":"13","cam_easeofexploitation":"14","cam_attackeraccessrequired":"15","cam_scorecurrent":"7.9340625","cam_scorecurrentwidelyknown":"9.21375","cam_scorecurrentwidelyknownexploited":"14.3325","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.9340625,"vulnote":null}