Lucene search

K
saintSAINT CorporationSAINT:B562473FEA5FF2437D6BB8DFFBC42FDE
HistoryApr 01, 2011 - 12:00 a.m.

RealFlex RealWin FC_RFUSER_FCS_LOGIN Buffer Overflow

2011-04-0100:00:00
SAINT Corporation
my.saintcorporation.com
22

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.614 Medium

EPSS

Percentile

97.8%

Added: 04/01/2011
CVE: CVE-2011-1563
BID: 46937

Background

RealWin is a Supervisory Control and Data Acquisition (SCADA) server which is distributed by DATAC.

Problem

A buffer overflow vulnerability in RealWin Server allows remote attackers to execute arbitrary commands by sending a long, specially crafted FC_RFUSER_FCS_LOGIN packet.

Resolution

Block access to port 910/TCP.

References

<http://secunia.com/advisories/43848&gt;

Limitations

Exploit works on RealFlex RealWin SCADA System 1.6 on Microsoft Windows Server 2003 SP2 with KB956802 and KB2393802.

Platforms

Windows 2003

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.614 Medium

EPSS

Percentile

97.8%

Related for SAINT:B562473FEA5FF2437D6BB8DFFBC42FDE