Synopsis
The remote host is running an application that is affected by multiple vulnerabilities.
Description
The remote host is running a version of Cogent DataHub that is prior to 7.3.0. It is, therefore, affected by the following vulnerabilities :
- An overflow condition exists in the HTTP server due to improper validation of user-supplied input when handling a specially crafted HTTP request with an overly long 'header' parameter. An unauthenticated, remote attacker can exploit this to cause a stack-based buffer overflow, resulting in a denial of service condition or the execution of arbitrary code. (CVE-2013-0680)
- A denial of service vulnerability exists that is triggered during the handling of specially crafted formatted text messages sent via TCP traffic. An unauthenticated, remote attacker can exploit this to cause a NULL pointer dereference, resulting in a crash of the service. (CVE-2013-0681)
- A remote code execution vulnerability exists due to an out-of-bounds read error that is triggered during the handling of specially crafted formatted text commands.
An unauthenticated, remote attacker can exploit this to execute arbitrary code. (CVE-2013-0682)
- A denial of service vulnerability exists that is triggered during the handling of malformed data in a formatted text command. An unauthenticated, remote attacker can exploit this to crash the client.
(CVE-2013-0683)
Solution
Upgrade to Cogent DataHub version 7.3.0 or later.
Plugin Details
File Name: scada_cogent_datahub_7_3_0.nbin
Configuration: Enable thorough checks
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Vulnerability Information
CPE: cpe:/a:cogentdatahub:cogent_datahub
Required KB Items: SCADA/cogent_datahub
Exploit Ease: Exploits are available
Patch Publication Date: 3/25/2013
Vulnerability Publication Date: 4/5/2013
Exploitable With
Metasploit (Cogent DataHub HTTP Server Buffer Overflow)