{"vuid":"VU#603928","idnumber":"603928","name":"Ecava IntegraXor stack-based buffer overflow vulnerability","keywords":["scada","Ecava","IntegraXor"],"overview":"Ecava IntegraXor contains a stack-based buffer overflow vulnerability in the Ecava IntegraXor Human-Machine Interface (HMI) product that could allow the execution of arbitrary code.","clean_desc":"According to Ecava's website: IntegraXor is a suite of tools used to create and run a web-based HMI interface for a Supervisory Control and Data Acquisition (SCADA) system. Ecava IntegraXor is vulnerable to a stack-based buffer overflow when more than 1024 bytes are written to the fixed-size stack buffer. When an exploit sends a request greater than 1024 bytes, IntegraXor writes past the buffer bounds and corrupts memory, allowing execution of arbitrary code.","impact":"An attacker can cause the device to crash and may be able to execute arbitrary code.","resolution":"Ecava has released a patch to mitigate the vulnerability and has notified its customer base of the availability of the patch.","workarounds":"","sysaffected":"","thanks":"Thanks to Jeremy Brown for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["h","t","t","p",":","/","/","w","w","w",".","u","s","-","c","e","r","t",".","g","o","v","/","c","o","n","t","r","o","l","_","s","y","s","t","e","m","s","/","p","d","f","/","I","C","S","A","-","1","0","-","3","2","2","-","0","1",".","p","d","f"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2010-11-22T21:09:10Z","publicdate":"2010-12-16T00:00:00Z","datefirstpublished":"2010-12-17T17:45:45Z","dateupdated":"2010-12-21T18:35:51Z","revision":19,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"14","cam_population":"14","cam_impact":"18","cam_easeofexploitation":"14","cam_attackeraccessrequired":"15","cam_scorecurrent":"21.8295","cam_scorecurrentwidelyknown":"33.7365","cam_scorecurrentwidelyknownexploited":"53.5815","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":21.8295,"vulnote":null}