Advisory Details

August 22nd, 2012

GE Proficy Real-Time Information Portal Remote Interface Service Remote Code Execution Vulnerability

ZDI-12-148
ZDI-CAN-1419

CVE ID CVE-2012-0232
CVSS SCORE 9.4, AV:N/AC:L/Au:N/C:C/I:C/A:N
AFFECTED VENDORS GE
AFFECTED PRODUCTS Proficy Real-Time Information Portal
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['11491']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GE Proficy Real-Time Information Portal. Authentication is not required to exploit this vulnerability.

This specific flaw exists within the Remote Interface Service (rifsrvd.exe). The Remote Interface Service listens on TCP port 5159 by default. The process does not sufficiently validate two input strings that are used to create a configuration file on the server. Remote, unauthenticated attackers can exploit this vulnerability by sending malformed ID_SAVE_SRVC_CFG message packets to the target, which could ultimately lead to remote code execution under the context of the SYSTEM user.

ADDITIONAL DETAILS GE has issued an update to correct this vulnerability. More details can be found at:
http://support.ge-ip.com/support/index?page=kbchannel&id=S:KB14768
DISCLOSURE TIMELINE
  • 2011-10-17 - Vulnerability reported to vendor
  • 2012-08-22 - Coordinated public release of advisory
CREDIT Luigi Auriemma
BACK TO ADVISORIES