This indicates an attempt to exploit a buffer-overflow vulnerability in CitectSCADA.
This vulnerability is due to the lack of proper length checking of user-supplied input. A remote attacker may exploit this to execute arbitrary code.
Citect CitectSCADA 7
Citect CitectSCADA 6
Citect CitectFacilities 7
System Compromise: Remote attackers can gain control of vulnerable systems.
Contact the vendor for fixed versions of the product.