Lucene search

K
saintSAINT CorporationSAINT:2D0858EEA8FDD587E1A4B5255B7C2D72
HistoryApr 11, 2011 - 12:00 a.m.

RealFlex RealWin FC_SCRIPT_FCS_STARTPROG Buffer Overflow

2011-04-1100:00:00
SAINT Corporation
www.saintcorporation.com
18

0.614 Medium

EPSS

Percentile

97.8%

Added: 04/11/2011
CVE: CVE-2011-1563
BID: 46937

Background

RealWin is a Supervisory Control and Data Acquisition (SCADA) server which is distributed by DATAC.

Problem

A buffer overflow vulnerability in RealWin Server allows remote attackers to execute arbitrary commands by sending a long, specially crafted FC_SCRIPT_FCS_STARTPROG packet.

Resolution

Block access to port 910/TCP.

References

<http://secunia.com/advisories/43848&gt;

Limitations

Exploit works on RealFlex RealWin SCADA System 1.6.

Platforms

Windows

0.614 Medium

EPSS

Percentile

97.8%

Related for SAINT:2D0858EEA8FDD587E1A4B5255B7C2D72