Lucene search

K
saintSAINT CorporationSAINT:4E52782167A51CBDE8D084DA2D0F8DDE
HistoryApr 20, 2011 - 12:00 a.m.

DATAC RealWin SCADA Server TAG function stack overflow

2011-04-2000:00:00
SAINT Corporation
my.saintcorporation.com
29

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.614

Percentile

97.8%

Added: 04/20/2011
CVE: CVE-2011-1563
BID: 46937

Background

RealWin is a Supervisory Control and Data Acquisition (SCADA) server which is distributed by DATAC.

Problem

A buffer overflow vulnerability in RealWin Server allows remote attackers to execute arbitrary commands by sending a long, specially crafted FC_CTAGLIST_FCS_CADDTAG, FC_CTAGLIST_FCS_CDELTAG or FC_CTAGLIST_FCS_ADDTAGMS packet.

Resolution

Block access to port 910/TCP.

References

<http://aluigi.org/adv/realwin_3-adv.txt&gt;
<http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-04.pdf&gt;
<http://secunia.com/advisories/43848&gt;

Limitations

This exploit works against RealFlex RealWin SCADA System 1.6a on Windows Server 2003 SP2 English (DEP OptOut) with KB956802 and KB2393802, and on Windows Server 2008 SP2 English (DEP AlwaysOff).

Platforms

Windows Server 2003
Windows Server 2008

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.614

Percentile

97.8%