Share: Email | Twitter

ID

VDE-2019-003

Published

2019-03-05 11:35 (CET)

Last update

2019-03-05 11:35 (CET)

Vendor(s)

PHOENIX CONTACT GmbH & Co. KG

Product(s)

Article No° Product Name Affected Version(s)
MEVIEW3 < 3.14.25
MEVIEW3 < 3.15.18

Summary

Multiple vulnerabilities for MEVIEW3 have been identified in PHOENIX CONTACT MEVIEW3, versions below 3.14.25 and 3.15.18

Vulnerabilities



Last Update
Feb. 18, 2020, 8:04 a.m.
Weakness
Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)
Summary
An exploitable heap overflow vulnerability exists in the WkbProgramLow function of WibuKey Network server management, version 6.40.2402.500. A specially crafted TCP packet can cause a heap overflow, potentially leading to remote code execution. An attacker can send a malformed TCP packet to trigger this vulnerability.
Last Update
Feb. 18, 2020, 8:04 a.m.
Weakness
Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)
Summary
An exploitable pool corruption vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400). A specially crafted IRP request can cause a buffer overflow, resulting in kernel memory corruption and, potentially, privilege escalation. An attacker can send an IRP request to trigger this vulnerability.
Last Update
Feb. 18, 2020, 8:04 a.m.
Weakness
Information Exposure (CWE-200)
Summary
An exploitable kernel memory disclosure vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400).A specially crafted IRP request can cause the driver to return uninitialized memory, resulting in kernel memory disclosure. An attacker can send an IRP request to trigger this vulnerability.

Impact

WIBU-SYSTEMS WibuKey network server management remote code execution vulnerability
The vulnerability affects all operating systems and allows the potential execution of code on network accessible WibuKey network servers. Only the systems on which a WibuKey network server is running are affected. This applies to systems that provide licenses for an attached WibuBox in the network for use by other clients.

WIBU-SYSTEMS WibuKey.sys pool has a corruption privilege escalation vulnerability.
The vulnerability affects Windows systems and allows potential unauthorized privilege escalation on the local system.

Solution

WibuKey Runtime Version 6.50 will be integrated in the next version MEVIEW3 (3.14.25 & 3.15.18).

Mitigation
a) Dongle based licensing
Update WibuKey Runtime to version 6.50. See: https://www.wibu.com/support/user/downloads-user-software.html

b) Hardwarecode-based licensing
Removing the WibuKey application.

For further information please refer to:
https://www.wibu.com/de/support/anwendersoftware/anwendersoftware/file/download/5638.html

Reported by

PHOENIX CONTACT Energy Automation GmbH was informed about this vulnerabilities by WIBU-SYSTEMS AG.