Vulnerabilities > CVE-2011-4044 - Unspecified vulnerability in Arcinfo Frontvue, Pcvue and Plantvue
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
An unspecified ActiveX control in SVUIGrd.ocx in ARC Informatique PcVue 6.0 through 10.0, FrontVue, and PlantVue allows remote attackers to modify files via calls to unknown methods.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 6 |
Exploit-Db
description PcVue <= 10.0 - Multiple Vulnerabilities. CVE-2011-4042,CVE-2011-4043,CVE-2011-4044,CVE-2011-4045. Dos exploit for windows platform id EDB-ID:17896 last seen 2016-02-02 modified 2011-09-27 published 2011-09-27 reporter Luigi Auriemma source https://www.exploit-db.com/download/17896/ title PcVue <= 10.0 - Multiple Vulnerabilities description PcVue 10.0 SV.UIGrdCtrl.1 'LoadObject()/SaveObject()' Trusted DWORD Vulnerability. CVE-2011-4044. Remote exploit for windows platform id EDB-ID:17975 last seen 2016-02-02 modified 2011-10-12 published 2011-10-12 reporter metasploit source https://www.exploit-db.com/download/17975/ title PcVue 10.0 SV.UIGrdCtrl.1 - 'LoadObject/SaveObject' Trusted DWORD Vulnerability
Metasploit
description | This module exploits a function pointer control within SVUIGrd.ocx of PcVue 10.0. By setting a dword value for the SaveObject() or LoadObject(), an attacker can overwrite a function pointer and execute arbitrary code. |
id | MSF:EXPLOIT/WINDOWS/BROWSER/PCVUE_FUNC |
last seen | 2020-06-13 |
modified | 2017-10-05 |
published | 2011-10-12 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/pcvue_func.rb |
title | PcVue 10.0 SV.UIGrdCtrl.1 'LoadObject()/SaveObject()' Trusted DWORD Vulnerability |
Seebug
bulletinFamily | exploit |
description | CVE ID: CVE-2011-4042,CVE-2011-4043,CVE-2011-4044,CVE-2011-4045 ARC Informatique是开发人机接口、监控和数据捕获(HMI/SCADA)软件的法国公司。 多个Arc Informatique产品在实现上存在多个安全漏洞,可被恶意用户利用操作某些数据并控制用户系统。 1)处理"SaveObject()"和"LoadObject()"方法(SVUIGrd.ocx)时存在的错误可被利用通过特制的"aStream"参数执行虚拟函数调用任意内存位置; 2)"GetExtendedColor()"方法(SVUIGrd.ocx)中的错误可被利用破坏内存; 3)"SaveObject()"方法(SVUIGrd.ocx)中的错误可通过目录遍历序列覆盖任意文件; 4)处理"DeletePage()"方法(aipgctl.ocx)时的错误可被利用执行虚拟函数调用任意内存位置。 0 ARC Informatique FrontVue ARC Informatique PcVue 10.x ARC Informatique PcVue 6.x ARC Informatique PcVue 7.x ARC Informatique PcVue 8.x ARC Informatique PcVue 9.x ARC Informatique PlantVue 厂商补丁: ARC Informatique ---------------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.arcinfo.com/index.php?lang=en |
id | SSV:26071 |
last seen | 2017-11-19 |
modified | 2011-12-16 |
published | 2011-12-16 |
reporter | Root |
title | Arc Informatique产品多个ActiveX控件漏洞 |
References
- http://www.pcvuesolutions.com/index.php?option=com_content&view=article&id=244&Itemid=257
- http://www.us-cert.gov/control_systems/pdf/ICSA-11-340-01.pdf
- https://support.pcvuescada.com/index.php?option=com_k2&view=item&id=512&Itemid=440
- http://www.pcvuesolutions.com/index.php?option=com_content&view=article&id=244&Itemid=257
- https://support.pcvuescada.com/index.php?option=com_k2&view=item&id=512&Itemid=440
- http://www.us-cert.gov/control_systems/pdf/ICSA-11-340-01.pdf