Description
AscoServer.exe in the server in Siemens SiPass integrated MP2.6 and earlier does not properly handle IOCP RPC messages received over an Ethernet network, which allows remote attackers to write data to any memory location and consequently execute arbitrary code via crafted messages, as demonstrated by an arbitrary pointer dereference attack or a buffer overflow attack.
Exploits (1)
References (5)
Core 5
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/50900
Various Sources x_refsource_misc
http://ics-cert.us-cert.gov/advisories/ICSA-12-305-01
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/86129
Vendor Advisory x_refsource_confirm
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-938777.pdf
Various Sources x_refsource_misc
http://ioactive.com/pdfs/SIEMENS_Sipass_Integrated_Ethernet_Bus_Arbitrary_Pointer_Dereference_V4.pdf
Scores
EPSS
0.3538
EPSS Percentile
97.1%
Details
CWE
CWE-119
Status
published
Products (1)
siemens/sipass_integrated
< mp2.6
Published
Nov 01, 2012
Tracked Since
Feb 18, 2026