Advanced Control Systems, Inc Unknown

Notified:  May 08, 2006 Updated: May 24, 2006

Status

Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Advanced Control systems customers should contact our HelpDesk for more information.

Barco Unknown

Notified:  May 08, 2006 Updated: May 25, 2006

Status

Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Barco is not using the specified protocal int this note. Barco is supplying only visualisation tools , meaning large monitors with graphical cards and is as such not connected to critical control components.

Eliop Unknown

Notified:  May 08, 2006 Updated: May 08, 2006

Status

Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

GEA-India Unknown

Notified:  May 08, 2006 Updated: May 08, 2006

Status

Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Hitachi Unknown

Notified:  June 21, 2006 Updated: June 21, 2006

Status

Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Invensys Process Systems Affected

Notified:  May 08, 2006 Updated: June 26, 2006

Status

Affected

Vendor Statement

LiveData ICCP Problem Report and Fix:  CERT VU#190617 June 18, 2006 Invensys is committed to ensuring that our customers and employees are kept current on issues that might affect or improve system operation. We are dedicated to focusing on product, application and service availability and reliability. This customer notification is provided to you for informational purposes only. Invensys has directly contacted the customers that may be affected by the situation described. Background The situation described below involves a third party product used in a limited number of I/A Series DCS and I/A Series SCADA, and Wonderware/InFusion customer installations. It also involves a United States government agency named in the following paragraphs. LiveData is a vendor located in Cambridge, MA, who makes a product called "Live RTI Server". This product in our usage supports a protocol called "ICCP", or Inter Control Center Protocol. We supply an RTI interface from the various platforms we support to the LiveData Live RTI Server. This interface is used to send and receive realtime data from the host system (I/A Series, FoxSCADA, or Wonderware/InFusion) to/from the remote system(s). The United States Computer Emergency Readiness Team (US-CERT) is a partnership between the Department of Homeland Security and the public and private sectors. Established in 2003 to protect the nation's Internet infrastructure, US-CERT coordinates defense against and responses to cyber attacks across the nation. Situation US-CERT has published Vulnerability Note VU#190617 on its website, relating to a potential problem that may be encountered with the LiveData ICCP Server software.  LiveData has addressed the issue in an updated release of LiveData ICCP Server (version 5.00.035). A specifically crafted network packet targeting LiveData Server's RFC 1006 network interface may lead to a heap-buffer overflow condition and eventual crash of LiveData Server.  A remote attacker with network access to a LiveData Server implementation could exploit this vulnerability to crash LiveData Server. No customer, to LiveData's knowledge, has experienced such an attack, but LiveData takes such possibilities very seriously. LiveData has identified Invensys as an impacted Vendor. In turn, Invensys has identified our customers that may be impacted, of which all have been notified and instructed on acquiring and implementing the latest version of LiveData ICCP Server (version 500.035). You may view the CERT report in detail at: http://www.kb.cert.org/vuls/id/190617 For Information If you have any questions regarding this notification, please contact your local Service Representative or the Invensys Customer Satisfaction Center (CSC) at or telephone:             USA: 1-866-746-6477 or 1-508-549-2424 (International + 1 508-549-2424).             Europe, the Middle East and Africa: +31 35 54 84125.             Asia-Pacific: +65 6829 8899.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

LiveData Inc. Affected

Notified:  February 23, 2006 Updated: September 22, 2008

Status

Affected

Vendor Statement

It is LiveData's opinion that these issues are software bugs exercised by protocol-illegal data packets, not security vulnerabilities, given that MMS/ICCP over OSI or RFC1006 are not secure protocols intended for use on public networks. It is the user's responsibility to secure MMS/ICCP network traffic at the network level. LiveData Server over RFC1006 is not marketed as a public network service, and those seeking a public network solution should look to Secure ICCP (ICCP over SSL). Treated as a bug, LiveData always responds to bug reports with software fixes as soon as we possibly can when the bug affects a customer. We do not normally push this information to other customers unless it is likely that they will be adversely affected by the bug. It is LiveData's opinion the no user is likely to be adversely affected by this bug.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Refer to ftp://ftp.livedata.com/ for the latest versions of LiveData Server and LiveData ICCP Server.

LogicaCMG Unknown

Notified:  May 08, 2006 Updated: May 08, 2006

Status

Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Radio Control Central Stations, Inc. Unknown

Notified:  May 08, 2006 Updated: May 24, 2006

Status

Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

We at RCCS are not using the ICCP interface.

S&C Electric Company Unknown

Notified:  May 08, 2006 Updated: May 08, 2006

Status

Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

SPL Worldgroup, Inc. Unknown

Notified:  May 08, 2006 Updated: May 08, 2006

Status

Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Telvent Unknown

Notified:  August 22, 2006 Updated: August 22, 2006

Status

Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Telvent Affected

Notified:  May 08, 2006 Updated: August 22, 2006

Status

Affected

Vendor Statement

Telvent is committed to ensuring the security of all of our customers and to addressing any potential vulnerabilities associated with our products, or third-party products we have integrated or deployed alongside our products. All customers affected by the LiveData VU#190617 vulnerability have been contacted directly. Situation: Telvent has deployed a very limited number of systems utilizing the LiveData Live RTI Server product, only one of which was found to operate the vulnerable version of the application. This system had not yet entered operation and an upgrade to a non-vulnerable version of the LiveData software was performed at the factory. Testing was performed to ensure that no adverse affects resulted from this upgrade. Any future deployments of the LiveData Live RTI Server software will be performed using software versions which are not subject to this vulnerability. No Telvent product lines are directly affected by this vulnerability and only those customers who have also requested the deployment of the LiveData Live RTI Server faced possible impact. No Telvent product lines or deployed systems remain affected by this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

View all 13 vendors View less vendors