CVE-2012-2515
Description
Multiple stack-based buffer overflows in the KeyHelp.KeyCtrl.1 ActiveX control in KeyHelp.ocx 1.2.312 in KeyWorks KeyHelp Module (aka the HTML Help component), as used in EMC Documentum ApplicationXtender Desktop 5.4; EMC Captiva Quickscan Pro 4.6 SP1; GE Intelligent Platforms Proficy Historian 3.1, 3.5, 4.0, and 4.5; GE Intelligent Platforms Proficy HMI/SCADA iFIX 5.0 and 5.1; GE Intelligent Platforms Proficy Pulse 1.0; GE Intelligent Platforms Proficy Batch Execution 5.6; GE Intelligent Platforms SI7 I/O Driver 7.20 through 7.42; and other products, allow remote attackers to execute arbitrary code via a long string in the second argument to the (1) JumpMappedID or (2) JumpURL method.
Affected products
12- cpe:2.3:a:emc:captiva_quickscan_pro:4.6:sp1:*:*:*:*:*:*
- cpe:2.3:a:emc:documentum_applicationxtender_desktop:5.4:*:*:*:*:*:*:*
- cpe:2.3:a:ge:intelligent_platforms_proficy_batch_execution:5.6:*:*:*:*:*:*:*
cpe:2.3:a:ge:intelligent_platforms_proficy_historian:3.1:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:ge:intelligent_platforms_proficy_historian:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:ge:intelligent_platforms_proficy_historian:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:ge:intelligent_platforms_proficy_historian:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:ge:intelligent_platforms_proficy_historian:4.5:*:*:*:*:*:*:*
cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_ifix:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_ifix:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\/scada_ifix:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:ge:intelligent_platforms_proficy_pulse:1.0:*:*:*:*:*:*:*
cpe:2.3:a:ge:intelligent_platforms_si7_i\/o_driver:7.20:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:ge:intelligent_platforms_si7_i\/o_driver:7.20:*:*:*:*:*:*:*
- cpe:2.3:a:ge:intelligent_platforms_si7_i\/o_driver:7.42:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- retrogod.altervista.org/9sg_emc_keyhelp.htmlnvdExploit
- www.securityfocus.com/bid/36546nvdExploit
- secunia.com/advisories/36905nvdVendor Advisory
- secunia.com/advisories/36914nvdVendor Advisory
- support.ge-ip.com/support/resources/sites/GE_FANUC_SUPPORT/content/live/KB/14000/KB14863/en_US/GEIP12-04%20Security%20Advisory%20-%20Proficy%20HTML%20Help.pdfnvdVendor Advisory
- www.us-cert.gov/control_systems/pdf/ICSA-12-131-02.pdfnvdUS Government Resource
- www.vupen.com/english/advisories/2009/2793nvd
- www.vupen.com/english/advisories/2009/2795nvd
News mentions
0No linked articles in our index yet.