Lucene search

K
saintSAINT CorporationSAINT:8819B5D18F56BF874377E056C8FAD32B
HistoryNov 08, 2010 - 12:00 a.m.

DATAC RealWin SCADA Server SCPC_INITIALIZE buffer overflow

2010-11-0800:00:00
SAINT Corporation
my.saintcorporation.com
28

10 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.587 Medium

EPSS

Percentile

97.7%

Added: 11/08/2010
CVE: CVE-2010-4142
BID: 44150
OSVDB: 68812

Background

RealWin is a Supervisory Control and Data Acquisition (SCADA) server which is distributed by DATAC.

Problem

A buffer overflow vulnerability allows remote attackers to execute arbitrary commands by sending a specially crafted SCPC_INITIALIZE or SCPC_INITIALIZE_RF packet to the RealWin SCADA server.

Resolution

Block access to port 912/TCP.

References

<http://aluigi.altervista.org/adv/realwin_1-adv.txt&gt;
<http://secunia.com/advisories/41849/&gt;

Limitations

Exploit works on RealWin SCADA 1.6.

Platforms

Windows

10 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.587 Medium

EPSS

Percentile

97.7%