CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
96.6%
LiveData ICCP Server contains a heap-based buffer overflow. This vulnerability may allow a remote attacker to crash the server.
Inter-Control Center Communications Protocol (ICCP)
According to the LiveData ICCP Server white paper:
The Inter-Control Center Communications Protocol (ICCP) is being specified by utility organizations throughout the world to provide data exchange over wide area networks (WANs) between utility control centers, utilities, power pools, regional control centers, and Non-Utility Generators. ICCP is also an international standard: International Electrotechnical Commission (IEC) Telecontrol Application Service Element 2 (TASE.2).
ISO Transport Service over TCP** (TPKT,**** RFC 1006)**
RFC 1006 specifies how to run the OSI transport protocol on top of TCP/IP. In the layered protocol model, RFC 1006 is situated between the TCP and OSI transport layers.
LiveData ICCP Server and LiveData Server
LiveData ICCP Server records and transmits data to other control points in process control networks. According to the LiveData ICCP Server white paper:
The LiveData ICCP Server is based on LiveData’s standard off-the-shelf software product, LiveData Server, which features a rich set of integration methods that can be easily applied to new and existing SCADA/EMS/DCS systems.
The Problem
The LiveData implementation of RFC 1006 is vulnerable to a heap-based buffer overflow. By sending a specially crafted packet to a vulnerable LiveData RFC 1006 implementation, a remote attacker may be able to trigger the overflow.
This vulnerability may allow a remote, unauthenticated attacker to crash a LiveData ICCP Server.
Upgrade
This issue is corrected in LiveData ICCP Server version 5.00.035.
190617
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: May 08, 2006 Updated: June 26, 2006
Affected
`LiveData ICCP Problem Report and Fix: CERT VU#190617
June 18, 2006
`
`Invensys is committed to ensuring that our customers and employees are kept current on issues that might affect or improve system operation. We are dedicated to focusing on product, application and service availability and reliability.
This customer notification is provided to you for informational purposes only. Invensys has directly contacted the customers that may be affected by the situation described.
Background
The situation described below involves a third party product used in a limited number of I/A Series DCS and I/A Series SCADA, and Wonderware/InFusion customer installations. It also involves a United States government agency named in the following paragraphs.
LiveData is a vendor located in Cambridge, MA, who makes a product called “Live RTI Server”. This product in our usage supports a protocol called “ICCP”, or Inter Control Center Protocol. We supply an RTI interface from the various platforms we support to the LiveData Live RTI Server. This interface is used to send and receive realtime data from the host system (I/A Series, FoxSCADA, or Wonderware/InFusion) to/from the remote system(s).
The United States Computer Emergency Readiness Team (US-CERT) is a partnership between the Department of Homeland Security and the public and private sectors. Established in 2003 to protect the nation’s Internet infrastructure, US-CERT coordinates defense against and responses to cyber attacks across the nation.
Situation
US-CERT has published Vulnerability Note VU#190617 on its website, relating to a potential problem that may be encountered with the LiveData ICCP Server software. LiveData has addressed the issue in an updated release of LiveData ICCP Server (version 5.00.035).
A specifically crafted network packet targeting LiveData Server’s RFC 1006 network interface may lead to a heap-buffer overflow condition and eventual crash of LiveData Server. A remote attacker with network access to a LiveData Server implementation could exploit this vulnerability to crash LiveData Server.
No customer, to LiveData’s knowledge, has experienced such an attack, but LiveData takes such possibilities very seriously. LiveData has identified Invensys as an impacted Vendor.
In turn, Invensys has identified our customers that may be impacted, of which all have been notified and instructed on acquiring and implementing the latest version of LiveData ICCP Server (version 500.035).
You may view the CERT report in detail at:
<http://www.kb.cert.org/vuls/id/190617>
For Information
If you have any questions regarding this notification, please contact your local Service Representative or the Invensys Customer Satisfaction Center (CSC) at `
<[mailto:[email protected]](<mailto:[email protected]>)>
`or telephone:
USA: 1-866-746-6477 or 1-508-549-2424 (International + 1 508-549-2424).
Europe, the Middle East and Africa: +31 35 54 84125.
Asia-Pacific: +65 6829 8899.`
The vendor has not provided us with any further information regarding this vulnerability.
Notified: February 23, 2006 Updated: September 22, 2008
Affected
It is LiveData’s opinion that these issues are software bugs exercised by protocol-illegal data packets, not security vulnerabilities, given that MMS/ICCP over OSI or RFC1006 are not secure protocols intended for use on public networks. It is the user’s responsibility to secure MMS/ICCP network traffic at the network level. LiveData Server over RFC1006 is not marketed as a public network service, and those seeking a public network solution should look to Secure ICCP (ICCP over SSL).
Treated as a bug, LiveData always responds to bug reports with software fixes as soon as we possibly can when the bug affects a customer. We do not normally push this information to other customers unless it is likely that they will be adversely affected by the bug. It is LiveData’s opinion the no user is likely to be adversely affected by this bug.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to <ftp://ftp.livedata.com/> for the latest versions of LiveData Server and LiveData ICCP Server.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23190617 Feedback>).
Notified: May 08, 2006 Updated: August 22, 2006
Affected
Telvent is committed to ensuring the security of all of our customers and to addressing any potential vulnerabilities associated with our products, or third-party products we have integrated or deployed alongside our products. All customers affected by the LiveData VU#190617 vulnerability have been contacted directly.
Situation:
Telvent has deployed a very limited number of systems utilizing the LiveData Live RTI Server product, only one of which was found to operate the vulnerable version of the application. This system had not yet entered operation and an upgrade to a non-vulnerable version of the LiveData software was performed at the factory. Testing was performed to ensure that no adverse affects resulted from this upgrade.
Any future deployments of the LiveData Live RTI Server software will be performed using software versions which are not subject to this vulnerability. No Telvent product lines are directly affected by this vulnerability and only those customers who have also requested the deployment of the LiveData Live RTI Server faced possible impact. No Telvent product lines or deployed systems remain affected by this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: May 08, 2006 Updated: May 24, 2006
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Advanced Control systems customers should contact our HelpDesk for more information.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23190617 Feedback>).
Notified: May 08, 2006 Updated: May 25, 2006
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Barco is not using the specified protocal int this note. Barco is supplying only visualisation tools , meaning large monitors with graphical cards and is as such not connected to critical control components.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23190617 Feedback>).
Notified: May 08, 2006 Updated: May 08, 2006
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: May 08, 2006 Updated: May 08, 2006
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: June 21, 2006 Updated: June 21, 2006
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: May 08, 2006 Updated: May 08, 2006
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: May 08, 2006 Updated: May 24, 2006
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
We at RCCS are not using the ICCP interface.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23190617 Feedback>).
Notified: May 08, 2006 Updated: May 08, 2006
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: May 08, 2006 Updated: May 08, 2006
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: August 22, 2006 Updated: August 22, 2006
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
View all 13 vendors __View less vendors __
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Matt Franz of Digital Bond Inc. for reporting this vulnerability. Information used in this document came from LiveData.
This document was written by Jeff Gennari.
CVE IDs: | CVE-2006-0059 |
---|---|
Severity Metric: | 7.93 Date Public: |