There are three vulnerabilities in MICROSYS, spol. s r.o. PROMOTIC application including directory traversal, ActiveX heap overflow, and ActiveX stack overflow vulnerabilities. Public exploits are targeting these vulnerabilities.
Independent researcher Luigi Auriemma released the vulnerabilities without coordination with ICS-CERT, the vendor, or any other known coordinating entity.
ICS-CERT has coordinated these vulnerabilities with MICROSYS, which has produced an update. Auriemma confirmed the update resolves these three vulnerabilities.
All PROMOTIC versions prior to Version 8.1.5 suffer from the vulnerabilities.
Successful exploitation of these vulnerabilities may result in denial of service or data leakage.
PROMOTIC is a Microsoft Windows based supervisory control and data acquisition human-machine interface (SCADA HMI) software programming suite for creating applications that monitor, control, and display technological processes. This suite also includes support for a web interface.
MICROSYS, spol. s r.o. is a Czech company with headquarters in Ostrava. The PROMOTIC system primarily sees use in the Czech and Slovak Republics, Poland, Hungary, Slovenia, Serbia, Bulgaria, and Romania.
A directory traversal vulnerability may occur when a specially crafted request passes to the web server running on Port 80\TCP. Successful exploitation could result in data leakage. CVE-2011-4518 is the number assigned to this vulnerability.
A stack overflow affecting an ActiveX component used by PROMOTIC may occur when a specially crafted HTML document opens on a client machine. Successful exploitation may cause a denial of service. CVE-2011-4519 is the number assigned to this vulnerability.
A heap overflow affecting an ActiveX component used by PROMOTIC may occur when a specially crafted HTML document opens on a client machine. Successful exploitation may cause a denial of service. CVE-2011-4520 is the number assigned to this vulnerability.
All three of these vulnerabilities are remotely exploitable and an attacker with a low skill level would be able to exploit these vulnerabilities. MICROSYS recommends users update their installations by downloading the latest version from MICROSYS.