Lucene search

K
saintSAINT CorporationSAINT:967DB3D05166C235AAA1BE51E929A83E
HistoryApr 11, 2011 - 12:00 a.m.

RealFlex RealWin FC_SCRIPT_FCS_STARTPROG Buffer Overflow

2011-04-1100:00:00
SAINT Corporation
download.saintcorporation.com
17

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.614 Medium

EPSS

Percentile

97.8%

Added: 04/11/2011
CVE: CVE-2011-1563
BID: 46937

Background

RealWin is a Supervisory Control and Data Acquisition (SCADA) server which is distributed by DATAC.

Problem

A buffer overflow vulnerability in RealWin Server allows remote attackers to execute arbitrary commands by sending a long, specially crafted FC_SCRIPT_FCS_STARTPROG packet.

Resolution

Block access to port 910/TCP.

References

<http://secunia.com/advisories/43848&gt;

Limitations

Exploit works on RealFlex RealWin SCADA System 1.6.

Platforms

Windows

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.614 Medium

EPSS

Percentile

97.8%

Related for SAINT:967DB3D05166C235AAA1BE51E929A83E