Lucene search

K
saintSAINT CorporationSAINT:9141802236C0FE45D47F6257EFDC505A
HistoryNov 08, 2010 - 12:00 a.m.

DATAC RealWin SCADA Server SCPC_INITIALIZE buffer overflow

2010-11-0800:00:00
SAINT Corporation
download.saintcorporation.com
15

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.587 Medium

EPSS

Percentile

97.8%

Added: 11/08/2010
CVE: CVE-2010-4142
BID: 44150
OSVDB: 68812

Background

RealWin is a Supervisory Control and Data Acquisition (SCADA) server which is distributed by DATAC.

Problem

A buffer overflow vulnerability allows remote attackers to execute arbitrary commands by sending a specially crafted SCPC_INITIALIZE or SCPC_INITIALIZE_RF packet to the RealWin SCADA server.

Resolution

Block access to port 912/TCP.

References

<http://aluigi.altervista.org/adv/realwin_1-adv.txt&gt;
<http://secunia.com/advisories/41849/&gt;

Limitations

Exploit works on RealWin SCADA 1.6.

Platforms

Windows

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.587 Medium

EPSS

Percentile

97.8%