Operating System:

[WIN]

Published:

25 February 2013

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2013.0029
          A number of vulnerabilities have been identified in 3S
             CODESYS Gateway-Server prior to version 2.3.9.27
                             25 February 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              3S CODESYS Gateway-Server
Operating System:     Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                      Denial of Service               -- Remote/Unauthenticated
                      Unauthorised Access             -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2012-4708 CVE-2012-4707 CVE-2012-4706
                      CVE-2012-4705 CVE-2012-4704 
Member content until: Wednesday, March 27 2013

OVERVIEW

        A number of vulnerabilities have been identified in 3S CODESYS 
        Gateway-Server prior to version 2.3.9.27. [1]


IMPACT

        ICS-CERT has provided the following details regarding these 
        vulnerabilities:
        
        "IMPROPER ACCESS OF INDEXABLE RESOURCE (RANGE ERROR)
        
        The 3S CODESYS Gateway-Server performs operations on a memory 
        buffer, but it can read from or write to a memory location that is 
        outside of the intended boundary of the buffer. This could allow the
        attacker to send a specially crafted packet over TCP/1211 to cause a
        crash, read from unintended memory locations, or execute arbitrary 
        code stored in a separate memory location.
        
        CVE-2012-4704 has been assigned to this vulnerability. A CVSS v2 
        base score of 9.4 has been assigned; the CVSS vector string is 
        (AV:N/AC:L/Au:N/C:C/I:N/A:C)." [1]
        
        "DIRECTORY OR PATH TRAVERSAL
        
        The 3S CODESYS Gateway-Server uses external input to construct a 
        pathname that is intended to identify a file or directory that is 
        located underneath a restricted parent directory. However, the 
        software does not properly neutralize special elements within the 
        pathname that can cause the pathname to resolve to a location 
        outside the restricted directory. An attacker can use a specially 
        crafted directory path to exploit this vulnerability.
        
        CVE-2012-4705 has been assigned to this vulnerability. A CVSS v2 
        base score of 10.0 has been assigned; the CVSS vector string is 
        (AV:N/AC:L/Au:N/C:C/I:C/A:C)." [1]
        
        "HEAP-BASED BUFFER OVERFLOW
        
        The 3S CODESYS Gateway-Server fails to check for a signed value that
        could lead to the buffer being overwritten with malicious code. This
        vulnerability is exploited by sending a specially crafted packet 
        over TCP/1211 affecting the availability of the system.
        
        CVE-2012-4706 has been assigned to this vulnerability. A CVSS v2 
        base score of 7.8 has been assigned; the CVSS vector string is 
        (AV:N/AC:L/Au:N/C:N/I:N/A:C)." [1]
        
        "IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY 
        BUFFER
        
        The 3S CODESYS Gateway-Server can read or write to a memory location
        that is outside the intended boundary of the buffer. As a result, an
        attacker may execute arbitrary code, alter the intended control 
        flow, read sensitive information, or cause a system crash. 
        CVE-2012-4707 has been assigned to this vulnerability.
        
        A CVSS v2 base score of 7.8 has been assigned; the CVSS vector 
        string is (AV:N/AC:L/Au:N/C:N/I:N/A:C)." [1]
        
        "STACK-BASED BUFFER OVERFLOW
        
        By sending a specially crafted packet to the 3S CODESYS 
        Gateway-Server over Port TCP/1211, an attacker can cause a 
        stack-based buffer overflow. This condition could allow an attacker
        to cause a system crash or denial of service.
        
        CVE-2012-4708 has been assigned to this vulnerability. A CVSS v2 
        base score of 10 has been assigned; the CVSS vector string is 
        (AV:N/AC:L/Au:N/C:C/I:C/A:C)." [1]


MITIGATION

        ICS-CERT recommends that administrators apply the security patch
        available from the download site for CODESYS at 
        http://www.codesys.com/download.html


REFERENCES

        [1] ICSA-13-050-01 - 3S CODESYS GATEWAY-SERVER MULTIPLE VULNERABILITIES
            http://ics-cert.us-cert.gov/pdf/ICSA-13-050-01.pdf

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBUSsPAe4yVqjM2NGpAQKacg/8DhY0FRLFczstxKRhgeijBGeeb1HBJvpY
aF1dfQvEM6i9vDpLVm9+ol24Pv1wmJxQXYpyMRVNzOhycw9dTRYrpKYFYiJAZwj0
wOTrX3wT+1Sn5Duap8g0nkW10O5AtF6MZ4c+2yubyF81nvw0fsjo9lHosDrrtD+E
troHtfBMjPXz1KyCsHzUxhSfP2+qfuioZ5CzrzCa/0U3eXrx6UDbuQJZAgqXNlKa
IMrxmkeAChXhU9l++whuziTKUMG0sPxec5g6gw1QYmr7KW4kZ2DxX4O9001D/tOl
S6wZmPcypMuWxu2YuiWFSMv2v4XrKxa3rUTnAEUoCJy4isLHWFVP0CUzLmi+cQzw
uTcgbTWAAYEqGs5lnMbHoG94azBTEKGwQ/JpfZIaTuJDFfDN8G1Y6syFtcTwGhKi
gAuZ5vV0823OL6HCheaPeEy0K6p5f/DoBCBA9nAdYb+5pxtqvW6I/8IN+6uASRX7
+GjiRDku7MYLvh0Xc+eSIYROjKEepT8ShjRj7f59d2Gi/H5bfMAx4tD7oVRxGv5/
IumUQa2Q3jTdkjxdaiYXC/Q29i/+gwnCDe1qIiyx+Y13SoCbkM5ERrIObsPJM659
CuSbpLh0U58v8rXPQRGoBXoRj97IMFAylQk2gWn51prqNRUQh6aOg2Xs/UKbcMNr
9UXzyBx4ANE=
=pz7V
-----END PGP SIGNATURE-----