RealFlex RealWin FC_SCRIPT_FCS_STARTPROG Buffer Overflow

2011-04-11T00:00:00
ID SAINT:F735E39515AC6DB3BE749782903AFDC3
Type saint
Reporter SAINT Corporation
Modified 2011-04-11T00:00:00

Description

Added: 04/11/2011
CVE: CVE-2011-1563
BID: 46937

Background

RealWin is a Supervisory Control and Data Acquisition (SCADA) server which is distributed by DATAC.

Problem

A buffer overflow vulnerability in RealWin Server allows remote attackers to execute arbitrary commands by sending a long, specially crafted FC_SCRIPT_FCS_STARTPROG packet.

Resolution

Block access to port 910/TCP.

References

<http://secunia.com/advisories/43848>

Limitations

Exploit works on RealFlex RealWin SCADA System 1.6.

Platforms

Windows