Short Name |
SCADA:REALWIN |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
SCADA |
Keywords |
DATAC RealWin SCADA Server |
Release Date |
2008/09/30 |
Update Number |
1291 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the DATAC RealWin SCADA Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
DATAC RealWin SCADA server is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the affected application. This may facilitate the complete compromise of affected computers. Failed exploit attempts may result in a denial-of-service condition. RealWin SCADA server 2.0 is affected; other versions may also be vulnerable.