CVE-2010-2974 (GCVE-0-2010-2974)
Vulnerability from cvelistv5 – Published: 2010-08-05 19:00 – Updated: 2024-09-17 03:43
VLAI?
Summary
Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:55:45.509Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#703189",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/703189"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/MORO-87MHPT"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-08-05T19:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "VU#703189",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/703189"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kb.cert.org/vuls/id/MORO-87MHPT"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-2974",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#703189",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/703189"
},
{
"name": "http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108",
"refsource": "CONFIRM",
"url": "http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108"
},
{
"name": "https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm",
"refsource": "CONFIRM",
"url": "https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm"
},
{
"name": "http://www.kb.cert.org/vuls/id/MORO-87MHPT",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/MORO-87MHPT"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-2974",
"datePublished": "2010-08-05T19:00:00Z",
"dateReserved": "2010-08-05T00:00:00Z",
"dateUpdated": "2024-09-17T03:43:16.392Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:invensys:wonderware_archestra_configuration_access_component_activex_control:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B08B61E8-62EF-46B0-8881-300A02E911F5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:invensys:infusion_integrated_engineering_environment:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9294B6B1-7D7C-461B-ADC1-D90251FADB96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:invensys:wonderware_application_server:*:sp2:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.1\", \"matchCriteriaId\": \"C53D322C-1D42-479E-9225-40684655F4CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:invensys:wonderware_application_server:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68FA27FB-6AA3-4E6F-83EB-066DAF0BD3A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:invensys:wonderware_application_server:2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B64216A-3D05-4384-8B35-845974B99128\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:invensys:wonderware_application_server:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5EA5956-AFFF-4AF6-8E51-60B702E4E3FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:invensys:wonderware_application_server:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA9909E3-C0C3-4EE8-A592-948D8F90E569\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:invensys:wonderware_application_server:3.1:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2576F8F1-DA43-47E1-95D9-9A9233FCD2B0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:invensys:wonderware_archestra_integrated_development_environment:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C0CE9E0-61A4-4D92-BB3F-4437E77E27CE\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de b\\u00fafer basado en pila en la interfaz IConfigurationAccess en el control ActiveX Invensys Wonderware Archestra ConfigurationAccessComponent de Wonderware Application Server (WAS) anterior a v3.1 SP2 P01, como el usado en el Wonderware Archestra Integrated Development Environment (IDE) y el InFusion Integrated Engineering Environment (IEE), permite a los atacantes remotos ejecutar c\\u00f3digo a su elecci\\u00f3n a trav\\u00e9s del primer argumento del m\\u00e9todo UnsubscribeData.\"}]",
"evaluatorSolution": "Per: http://www.kb.cert.org/vuls/id/703189\r\n\r\n\u0027According to Invensys, users that are using IAS 2.1 (all versions)-IDE, WAS 3.0 (all versions)-IDE, WAS 3.1 (all versions)-IDE, InFusion CE 2.0-IEE, InFusion FE 1.0 (all versions)-IEE, InFusion FE 2.0-IEE, InFusion SCADA 2.0\u2013IEE should apply the vendor security update. This vulnerability is not present in Wonderware Application Server 3.1 Service Pack 2 Patch 01 (WAS 3.1 SP2 P01).\u0027",
"id": "CVE-2010-2974",
"lastModified": "2024-11-21T01:17:45.957",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2010-08-05T19:17:55.543",
"references": "[{\"url\": \"http://www.kb.cert.org/vuls/id/703189\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/MORO-87MHPT\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/703189\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/MORO-87MHPT\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2010-2974\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-08-05T19:17:55.543\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer basado en pila en la interfaz IConfigurationAccess en el control ActiveX Invensys Wonderware Archestra ConfigurationAccessComponent de Wonderware Application Server (WAS) anterior a v3.1 SP2 P01, como el usado en el Wonderware Archestra Integrated Development Environment (IDE) y el InFusion Integrated Engineering Environment (IEE), permite a los atacantes remotos ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s del primer argumento del m\u00e9todo UnsubscribeData.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invensys:wonderware_archestra_configuration_access_component_activex_control:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08B61E8-62EF-46B0-8881-300A02E911F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:invensys:infusion_integrated_engineering_environment:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9294B6B1-7D7C-461B-ADC1-D90251FADB96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invensys:wonderware_application_server:*:sp2:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.1\",\"matchCriteriaId\":\"C53D322C-1D42-479E-9225-40684655F4CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invensys:wonderware_application_server:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68FA27FB-6AA3-4E6F-83EB-066DAF0BD3A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invensys:wonderware_application_server:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B64216A-3D05-4384-8B35-845974B99128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invensys:wonderware_application_server:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5EA5956-AFFF-4AF6-8E51-60B702E4E3FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invensys:wonderware_application_server:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA9909E3-C0C3-4EE8-A592-948D8F90E569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invensys:wonderware_application_server:3.1:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2576F8F1-DA43-47E1-95D9-9A9233FCD2B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:invensys:wonderware_archestra_integrated_development_environment:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C0CE9E0-61A4-4D92-BB3F-4437E77E27CE\"}]}]}],\"references\":[{\"url\":\"http://www.kb.cert.org/vuls/id/703189\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MORO-87MHPT\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/703189\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MORO-87MHPT\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorSolution\":\"Per: http://www.kb.cert.org/vuls/id/703189\\r\\n\\r\\n\u0027According to Invensys, users that are using IAS 2.1 (all versions)-IDE, WAS 3.0 (all versions)-IDE, WAS 3.1 (all versions)-IDE, InFusion CE 2.0-IEE, InFusion FE 1.0 (all versions)-IEE, InFusion FE 2.0-IEE, InFusion SCADA 2.0\u2013IEE should apply the vendor security update. This vulnerability is not present in Wonderware Application Server 3.1 Service Pack 2 Patch 01 (WAS 3.1 SP2 P01).\u0027\"}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…