ID

VAR-E-201010-0131


CVE

cve_id:CVE-2010-4142

Trust: 2.4

sources: BID: 44150 // PACKETSTORM: 96096 // EXPLOIT-DB: 15259 // EDBNET: 38170

EDB ID

15259


TITLE

DATAC RealWin SCADA Server 2.0 (Build 6.1.8.10) - Buffer Overflow - Windows dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 15259

DESCRIPTION

DATAC RealWin SCADA Server 2.0 (Build 6.1.8.10) - Buffer Overflow. CVE-68812CVE-2010-4142 . dos exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 15259

AFFECTED PRODUCTS

vendor:datacmodel:realwin scada server (buildscope:eqversion:2.06.1.8.10)

Trust: 1.0

vendor:datacmodel:realwin (buildscope:lteversion:<=2.06.1.8.10)

Trust: 0.6

vendor:datacmodel:realwin scada server scpc txteventscope: - version: -

Trust: 0.5

vendor:datacmodel:control international realwin scada serverscope:eqversion:2.0

Trust: 0.3

vendor:datacmodel:control international realwin scada serverscope:eqversion:1.06

Trust: 0.3

vendor:datacmodel:control international realwin scada serverscope:neversion:2.1.10

Trust: 0.3

sources: BID: 44150 // PACKETSTORM: 96096 // EXPLOIT-DB: 15259 // EDBNET: 38170

EXPLOIT

Source: http://aluigi.org/adv/realwin_1-adv.txt

#######################################################################

Luigi Auriemma

Application: DATAC RealWin
http://www.dataconline.com/software/realwin.php
http://www.realflex.com
Versions: <= 2.0 (Build 6.1.8.10)
Platforms: Windows
Bugs: A] stack overflow in SCPC_INITIALIZE and SCPC_INITIALIZE_RF
B] stack overflow in SCPC_TXTEVENT
Exploitation: remote, versus server
Date: 15 Oct 2010
Author: Luigi Auriemma
e-mail: aluigi@autistici.org
web: aluigi.org

#######################################################################

1) Introduction
2) Bugs
3) The Code
4) Fix

#######################################################################

===============
1) Introduction
===============

"RealWin is a SCADA server package for medium / small applications."

#######################################################################

=======
2) Bugs
=======

-----------------------------------------------------------
A] stack overflow in SCPC_INITIALIZE and SCPC_INITIALIZE_RF
-----------------------------------------------------------

The service of the server running on port 912 is vulnerable to a
stack based buffer-overflow caused by the usage of sprintf() for
building a particular string with the data supplied by the attacker:

sprintf(
stack_buffer,
"C:\\Program Files\\...path_of_RealWin...\\data\\crt\\fwd\\tel\\%s.%d",
attacker_string,
attacker_16bit_number);

----------------------------------
B] stack overflow in SCPC_TXTEVENT
----------------------------------

The same server is vulnerable also to another stack based overflow
caused by the usage of strcpy() with the data supplied by the attacker.

#######################################################################

===========
3) The Code
===========

http://aluigi.org/poc/realwin_1.zip
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15259.zip (realwin_1.zip)

nc SERVER 912 < realwin_1a.dat
nc SERVER 912 < realwin_1b.dat
nc SERVER 912 < realwin_1c.dat

#######################################################################

======
4) Fix
======

No fix.

#######################################################################

Trust: 1.0

sources: EXPLOIT-DB: 15259

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 15259

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 15259

TYPE

Buffer Overflow

Trust: 1.0

sources: EXPLOIT-DB: 15259

TAGS

tag:exploit

Trust: 0.5

tag:overflow

Trust: 0.5

tag:arbitrary

Trust: 0.5

sources: PACKETSTORM: 96096

CREDITS

Luigi Auriemma

Trust: 0.6

sources: EXPLOIT-DB: 15259

EXTERNAL IDS

db:NVDid:CVE-2010-4142

Trust: 2.4

db:EXPLOIT-DBid:15259

Trust: 1.6

db:EDBNETid:38170

Trust: 0.6

db:PACKETSTORMid:96096

Trust: 0.5

db:CERT/CCid:VU#222657

Trust: 0.3

db:BIDid:44150

Trust: 0.3

sources: BID: 44150 // PACKETSTORM: 96096 // EXPLOIT-DB: 15259 // EDBNET: 38170

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2010-4142

Trust: 2.1

url:http://aluigi.org/adv/realwin_1-adv.txt

Trust: 1.0

url:https://www.exploit-db.com/exploits/15259/

Trust: 0.6

url:http://aluigi.altervista.org/adv/realwin_1-adv.txt

Trust: 0.3

url:http://www.dataconline.com/software/realwin.php

Trust: 0.3

url:http://www.realflex.com

Trust: 0.3

url:http://www.realflex.com/

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/222657

Trust: 0.3

sources: BID: 44150 // PACKETSTORM: 96096 // EXPLOIT-DB: 15259 // EDBNET: 38170

SOURCES

db:BIDid:44150
db:PACKETSTORMid:96096
db:EXPLOIT-DBid:15259
db:EDBNETid:38170

LAST UPDATE DATE

2022-07-27T09:16:23.614000+00:00


SOURCES UPDATE DATE

db:BIDid:44150date:2010-11-19T18:26:00

SOURCES RELEASE DATE

db:BIDid:44150date:2010-10-15T00:00:00
db:PACKETSTORMid:96096date:2010-11-24T22:57:50
db:EXPLOIT-DBid:15259date:2010-10-15T00:00:00
db:EDBNETid:38170date:2010-10-15T00:00:00