Vulnerability Note VU#180119

WellinTech KingView 6.53 remote heap overflow vulnerability

Original Release date: 12 Jan 2011 | Last revised: 18 Jan 2011

Overview

WellinTech KingView 6.53 contains a remote heap overflow vulnerability in the HistorySrv process which may allow a remote, unauthenticated attacker to execute arbitrary code.

Description

According to WellinTech's website: "KingView software is a high-pormance production which can be used to building a data information service platform in automatic field. KingView software can provide graphic visualization which takes your operations management, control and optimization. KingView is widely used in power, water conservancy,buildings, coalmine, environmental protection, metallurgy and so on. " KingView runs a HistorySrv service that listens on port 777 that listens for incoming connections. This service is vulnerable to a remote heap overflow when a payload containing malicious Flink and Blink pointers are sent to the service.

Exploit code for this vulnerability is publicly available.

Impact

An attacker can cause the service to crash and may be able to execute arbitrary code as the user.

Solution

According to WellinTech's website a patch (version 6.53(2010-12-15)) has been issued to address this vulnerability.

Restrict Access

Enable firewall rules to restrict access for port 777/tcp to only trusted sources.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
WellinTechAffected-18 Jan 2011
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported by Dillon Beresford of NSS Labs.

This document was written by Michael Orlando.

Other Information

  • CVE IDs: CVE-2011-0406
  • Date Public: 09 Jan 2011
  • Date First Published: 12 Jan 2011
  • Date Last Updated: 18 Jan 2011
  • Severity Metric: 91.20
  • Document Revision: 30

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.