TCPIPS_Story.dll in Sielco Sistemi Winlog Pro SCADA before 2.07.17 and Winlog Lite SCADA before 2.07.17 allows remote attackers to execute arbitrary code via a port-46824 TCP packet with a crafted positive integer after the opcode, triggering incorrect function-pointer processing that can lead to a buffer overflow. NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://aluigi.org/adv/winlog_2-adv.txt | Exploit |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-213-01.pdf | US Government Resource |
http://secunia.com/advisories/49395 | Vendor Advisory |
http://www.sielcosistemi.com/en/news/index.html?id=69 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2012-08-19 13:55
Updated : 2012-08-19 21:00
NVD link : CVE-2012-4354
Mitre link : CVE-2012-4354
JSON object : View
CWE
CWE-189
Numeric Errors
Products Affected
sielcosistemi
- winlog_pro
- winlog_lite