PT-2013-28: Buffer Overflow in Siemens Simatic WinCC and PCS 7 Vulnerable softwareSiemens Simatic WinCC Version: 7.0 SP3 and earlierSiemens Simatic PCS 7 Version: 8.0 and earlierApplication link: http://www.siemens.com/Severity levelSeverity level: Medium Impact: Arbitrary Code Execution Access Vector: Remote CVSS v2: Base Score: 6.8 Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P)CVE: CVE-2013-0674Software description Simatic WinCC is a part of Siemens SIMATIC HMI software that aimed to provide connection between an operator and PLCs that manage technological processes.Vulnerability descriptionThe specialists of the Positive Research center have detected "Buffer Overflow" vulnerability in Siemens Simatic WinCC and PCS 7.An ActiveX control "RegReader", which is installed in the user’s web browser, is susceptible to a buffer overflow. An attacker might trick a victim into visiting a malicious web site, which calls this ActiveX control, triggers the overflow, and take over the victim’s PC.How to fixUpdate your software up to the latest versionAdvisory status 02.08.2012 - Vendor gets vulnerability details 15.03.2013 - Vendor releases fixed version and details 29.03.2013 - Public disclosureCreditsThe vulnerability was discovered by Gleb Gritsai, Dmitry Nagibin,Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2013-28 http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf Reports on the vulnerabilities previously discovered by Positive Research:http://ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/