GE Proficy Real-Time Information Portal Remote Interface Service Remote Code Execution VulnerabilityZDI-12-148: August 22nd, 2012
Proficy Real-Time Information Portal
TippingPoint™ IPS Customer ProtectionTippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 11491. For further product information on the TippingPoint IPS:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GE Proficy Real-Time Information Portal. Authentication is not required to exploit this vulnerability.
This specific flaw exists within the Remote Interface Service (rifsrvd.exe). The Remote Interface Service listens on TCP port 5159 by default. The process does not sufficiently validate two input strings that are used to create a configuration file on the server. Remote, unauthenticated attackers can exploit this vulnerability by sending malformed ID_SAVE_SRVC_CFG message packets to the target, which could ultimately lead to remote code execution under the context of the SYSTEM user.
Vendor ResponseGE has issued an update to correct this vulnerability. More details can be found at:
2011-10-17 - Vulnerability reported to vendor
2012-08-22 - Coordinated public release of advisory
CreditThis vulnerability was discovered by: