SB2011122501 - Multiple vulnerabilities in CODESYS



SB2011122501 - Multiple vulnerabilities in CODESYS

Published: December 25, 2011 Updated: August 11, 2020

Security Bulletin ID SB2011122501
Severity
Medium
Patch available
NO
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2011-5058)

The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.

The CmbWebserver.dll module of the Control service in 3S CoDeSys 3.4 SP4 Patch 2 allows remote attackers to create arbitrary directories under the web root by specifying a non-existent directory using (backslash) characters in an HTTP GET request.


2) Heap-based buffer overflow (CVE-ID: CVE-2011-5008)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Integer overflow in the GatewayService component in 3S CoDeSys 3.4 SP4 Patch 2. A remote attacker can use a large size value in the packet header to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) NULL pointer dereference (CVE-ID: CVE-2011-5009)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via (1) a crafted Content-Length in an HTTP POST or (2) an invalid HTTP request method.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.