RealFlex.RealWin.Server.Malicious.Packet.Buffer.Overflow

description-logoDescription

This indicates an attack attempt against a buffer-overflow vulnerability in Realflex RealWin Scada Server.
The vulnerability is caused by improper bounds checking in the "INFOTAG_SET_CONTROL" function. By sending a specially crafted packet to the server interface (default TCP/910), a remote attacker could overflow a buffer and execute arbitrary code on a vulnerable system.

affected-products-logoAffected Products

DATAC Control International RealWin SCADA Server 2.0

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Upgrade to the latest version, available from the following web site: http://www.realflex.com/products/realwin/realwin.php

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-02-01 14.540 Name:Realflex.
RealWin.
Server.
Malicious.
Packet.
Buffer.
Overflow:RealFlex.
RealWin.
Server.
Malicious.
Packet.
Buffer.
Overflow