Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SCADA:REALWIN

Severity

Critical

Recommended

No

Recommended Action

Drop

Category

SCADA

Keywords

DATAC RealWin SCADA Server

Release Date

2008/09/30

Update Number

1291

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SCADA: DATAC RealWin SCADA Server


This signature detects attempts to exploit a known vulnerability in the DATAC RealWin SCADA Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

DATAC RealWin SCADA server is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the affected application. This may facilitate the complete compromise of affected computers. Failed exploit attempts may result in a denial-of-service condition. RealWin SCADA server 2.0 is affected; other versions may also be vulnerable.

Affected Products

  • DATAC Control International RealWin SCADA Server 2.0

References

  • BugTraq: 31418
  • CVE: CVE-2008-4322
  • URL: http://www.dataconline.com/software/realwin.php
  • URL: http://downloads.securityfocus.com/vulnerabilities/exploits/31418.c

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out