RBS Asante VMS ActiveXCoat ActiveX Control ConnectToVMS() Method Heap Buffer Overflow of 7

Similar documents
RBS S Pocketnet Tech MediaViewer ActiveX Control Multiple Buffer Overflow Vulnerabilities of 14

RBS of 6

RBS OpenEMR Multisite Setup Improper Access Restriction Remote Code Execution of 5

RBS EverFocus Electronics Corp EPlusOcx ActiveX Control Multiple Stack Buffer Overflows of 10

RBS Axis Products Management Web Interface Multiple Vulnerabilities of 9

RBS NetGain Enterprise Manager Multiple Vulnerabilities of 11

RBS Rockwell Automation FactoryTalk Services Platform RNADiagnostics Module Missing Size Field Validation Remote Denial of Service.

RBS NetGain Enterprise Manager Web Interface Multiple Vulnerabilities of 9

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

RiskSense Attack Surface Validation for Web Applications

Carbon Black PCI Compliance Mapping Checklist

Integrated, Intelligence driven Cyber Threat Hunting

locuz.com SOC Services

Building and Instrumenting the Next- Generation Security Operations Center. Sponsored by

Advanced Security Tester Course Outline

align security instill confidence

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

Microsoft SDL 한국마이크로소프트보안프로그램매니저김홍석부장. Security Development Lifecycle and Building Secure Applications

Chapter 5: Vulnerability Analysis

Think Like an Attacker

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Security. Made Smarter.

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

ForeScout ControlFabric TM Architecture

ForeScout Extended Module for Qualys VM

Agile Security Solutions

Cloud Customer Architecture for Securing Workloads on Cloud Services

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Microsoft Security Management

CYBER THREAT INTEL: A STATE OF MIND. Internal Audit, Risk, Business & Technology Consulting

Reinvent Your 2013 Security Management Strategy

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES

RSA IT Security Risk Management

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

RiskSense Attack Surface Validation for IoT Systems

CYBERSMART BUILDINGS. Securing Your Investments in Connectivity and Automation

Think Like an Attacker

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

BERGRIVIER MUNICIPALITY

ForeScout Extended Module for Splunk

<Partner Name> <Partner Product> RSA Ready Implementation Guide for. Rapid 7 Nexpose Enterprise 6.1

How AlienVault ICS SIEM Supports Compliance with CFATS

McAfee Total Protection for Data Loss Prevention

Building Secure Systems

IBM services and technology solutions for supporting GDPR program

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra

Critical Hygiene for Preventing Major Breaches

Secure Development Lifecycle

Introduction to Network Discovery and Identity

8 Must Have. Features for Risk-Based Vulnerability Management and More

ALIENVAULT USM FOR AWS SOLUTION GUIDE

Cyber Resilience - Protecting your Business 1

12 th January MWR InfoSecurity Security Advisory. WebSphere MQ xcsgetmem Heap Overflow Vulnerability. Contents

You ve Been Hacked Now What? Incident Response Tabletop Exercise

Snort: The World s Most Widely Deployed IPS Technology

Taking Control of Your Application Security

Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

WHITEPAPER. Enterprise Cyber Risk Management Protecting IT Assets that Matter

GDPR: An Opportunity to Transform Your Security Operations

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

Twilio cloud communications SECURITY

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

Vulnerabilities. To know your Enemy, you must become your Enemy. Information security: Vulnerabilities & attacks threats. difficult.

Anomali ThreatStream IBM Resilient App

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation

Training for the cyber professionals of tomorrow

Vulnerability Assessments and Penetration Testing

Security: The Key to Affordable Unmanned Aircraft Systems

Medical Device Vulnerability Management

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

SYMANTEC DATA CENTER SECURITY

Microsoft Office Protected-View Out-Of- Bound Array Access

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350

Speed Up Incident Response with Actionable Forensic Analytics

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

CloudSOC and Security.cloud for Microsoft Office 365

NW NATURAL CYBER SECURITY 2016.JUNE.16

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Digital Defense Frontline VM 6.0

Are we breached? Deloitte's Cyber Threat Hunting

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

Suma Soft s IT Risk & Security Management Solutions for Global Enterprises

See What You ve Been Missing

Cybersecurity The Evolving Landscape

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

EU General Data Protection Regulation (GDPR) Achieving compliance

Sage Data Security Services Directory

Qualys Indication of Compromise

CND Exam Blueprint v2.0

NIST Framework for Improving Critical Infrastructure Cybersecurity Technical Control Automation

Security Driven Compliance

Transcription:

RBS 2014 003 Asante VMS ActiveXCoat ActiveX Control ConnectToVMS() Method Heap Buffer Overflow 2015 04 29 1 of 7

Table of Contents Table of Contents 2 About Risk Based Security 3 Mission 3 Background 3 Discriminators 3 Vulnerable Program Details 4 References 4 Credits 4 Vulnerability Details 5 Solution 6 Timeline 6 2015 04 29 2 of 7

About Risk Based Security Risk Based Security offers clients fully integrated security solutions, combining real time vulnerability and threat data, as well as the analytical resources to understand the implications of the data, resulting in not just security, but the right security. Company History Risk Based Security, Inc. (RBS) was established in early 2011 to better support the many users and initiatives of the Open Security Foundation including the OSVDB and DataLossDB projects. RBS was created to transform this wealth of security data into actionable information by enhancing the research available, and providing a first of its kind risk identification and evidence based security management service. As a data driven and vendor neutral organization, RBS is able to deliver focused security solutions that are timely, cost effective, and built to address the specific threats and vulnerabilities most relevant to the organizations we serve. We not only maintain vulnerability and data breach databases, we also use this information to inform our entire practice. Solutions VulnDB Vulnerability intelligence, alerting, and third party library tracking based on the largest and most comprehensive vulnerability database. Available as feature rich SaaS portal or powerful API Cyber Risk Analytics Extensive data breach database including interactive dashboards and breach analytics. Clients are able to gather and analyze security threat and data breach information on businesses, industries, geographies, and causes of loss. YourCISO Revolutionary service that provides organizations an affordable security solution including policies, vulnerability scans, awareness material, incident response, and access to high quality information security resources and consulting services. Vulnerability Assessments (VA) and Pentesting Regularly scheduled VAs and pentests help an organization identify weaknesses before the bad guys do. Managing the most comprehensive VDB puts us in a unique position to offer comprehensive assessments, combining the latest in scanning technology and our own data. Detailed and actionable reports are provided in a clear and easy to understand language. Security Development Lifecycle (SDL) Consulting, auditing, and verification specialized in breaking code, which in turn greatly increases the security of products. 2015 04 29 3 of 7

Vulnerable Program Details Details for the tested product and version: Vendor: UIC Corporation Product: Asante VMS Version: 2.3 Component: ActiveXCoat.ocx File version: 1.4.0.0 References RBS: RBS 2014 003 OSVDB / VulnDB: 1 108488 CVE: N/A Credits Carsten Eiram, Risk Based Security Twitter: @CarstenEiram Twitter: @RiskBased 1 http://www.osvdb.org/show/osvdb/108488 2015 04 29 4 of 7

Vulnerability Details Asante VMS is a video management software solution for displaying feeds from multiple surveillance cameras. Viewing the feeds is possible via Internet Explorer by accepting to install a bundled ActiveX control, Uniform Media ActiveX Coat Control (ActiveXCoat.ocx), on a client system when accessing the default web page for the first time. One of the supported methods by the ActiveX control is ConnectToVMS(), which takes a single string (surl) as argument. When supplying the 'surl' string argument, the function in ActiveXCoat.ocx that handles calls to the ConnectToVMS() method checks that the length is no longer than 3FFFFFFFh. 2015 04 29 5 of 7

If smaller, stack space is allocated accordingly using _alloca_probe_16, and the string is converted through a call to WideCharToMultiByte(). The resulting string is then copied straight into a 260 byte destination buffer at offset 1DCh of an object on the heap using an inlined strcpy() without performing any bounds checks. This allows triggering a heap based buffer overflow and gaining control of the program flow. 2015 04 29 6 of 7

Solution No fix is available from the vendor, and the product is now end of life. Users should delete the ActiveX control, and set the kill bit for CLSID {CC4A36F1 0CDA 48B5 BEFF 65A77B02CBCB}. Timeline 2014/05/18 Vulnerability discovered. 2014/05/28 Vulnerability reported to vendor. 2014/05/28 Vendor responds that info has been passed on to the engineering management team, and that the product is reaching end of life. 2014/06/30 2 OSVDB entry published and details made available on VulnDB. 2015/04/29 Publication of this vulnerability report. 2 https://www.riskbasedsecurity.com/risk data analytics/vulnerability database/ 2015 04 29 7 of 7