{"vuid":"VU#506864","idnumber":"506864","name":"InduSoft NTWebServer web service stack-based buffer overflow","keywords":["scada","InduSoft","NTWebServer"],"overview":"InduSoft NTWebServer web service contains a stack-based buffer overflow vulnerability.","clean_desc":"According to InduSoft's website: \"InduSoft Web Studio™ is a powerful collection of automation tools that provide all the automation building blocks to develop HMIs, SCADA systems and embedded instrumentation solutions. Utilize InduSoft integrated Web technologies to take advantage of Internet/intranet connectivity.\" InduSoft NTWebServer runs a test web service on port 80/tcp. InduSoft NTWebServer test web service is vulnerable to a stack-based buffer overflow when more than 2048 bytes are written to the fixed-size stack buffer causing the test web service to write past the bounds of the buffer and corrupt the memory.","impact":"An attacker can cause the service to crash and may be able to execute arbitrary code.","resolution":"Use IIS InduSoft recommends using NTWebServer test web service only for development purposes and Microsoft IIS for production.","workarounds":"Restrict Access Enable firewall rules to restrict access for port 80/tcp to only trusted sources.","sysaffected":"InduSoft's website lists other devices that may be using NT","thanks":"Thanks to Jeremy Brown for reporting this vulnerability to ICS-CERT.","author":"This document was written by Michael Orlando.","public":["http://www.us-cert.gov/control_systems/pdf/ICSA-10-337-01.pdf","http://www.indusoft.com/blog/?p=337","http://www.indusoft.com/mainpage.php?aricleid=17&type=Certified/Hardware"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2010-12-06T15:50:13Z","publicdate":"2011-01-04T00:00:00Z","datefirstpublished":"2011-01-12T16:08:34Z","dateupdated":"2011-01-12T23:13:23Z","revision":27,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"18","cam_population":"16","cam_impact":"20","cam_easeofexploitation":"18","cam_attackeraccessrequired":"20","cam_scorecurrent":"71.28","cam_scorecurrentwidelyknown":"82.08","cam_scorecurrentwidelyknownexploited":"125.28","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":71.28,"vulnote":null}