PT-2012-55: Remote code execution in Siemens Teamcenter

Vulnerable product

Siemens Teamcenter
Version: 2007 and 8.0

Application link:
http://www.plm.automation.siemens.com/en_us/products/teamcenter/index.shtml

Severity level

Severity level: High
Impact: Remote code execution
Access Vector: Remote  

CVSS v2:
Base Score: 10
Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE: not assigned

Product description

Teamcenter product life cycle management software helps companies deliver increasingly complex products while maximizing productivity and streamlining global operations.

Vulnerability description

The specialists of Positive Research, the Positive Technologies company research center, found a Remote code execution vulnerability in Siemens Teamcenter.
Teamcenter Secure File Management Service (tcfs) vulnerability exists because of invalid usage of memcpy  function with the destination address and length received from TCP packet.

How to fix

Update your software up to the latest version

Advisory status

09.10.2012 - Vendor is notified
09.10.2012 - Vendor gets vulnerability details
13.11.2012 - Vendor publishes fix information
04.02.2013 - Public disclosure

Credits

The vulnerability has discovered by Ilya Smit, Dmitry Efanov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2012-55
http://support.industrysoftware.automation.siemens.com/gtac.shtml

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/