ID

VAR-201011-0106


CVE

CVE-2010-4142


TITLE

DATAC RealWin Multiple Stack Buffer Overflow Vulnerabilities

Trust: 1.0

sources: IVD: 5bddcce8-1faa-11e6-abef-000c29c66e3d // IVD: 7d775f90-463f-11e9-bc81-000c29342cb1 // CNVD: CNVD-2010-2643

DESCRIPTION

Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests. RealFlex RealWin HMI service (912/tcp) Contains multiple stack buffer overflow vulnerabilities. RealFlex RealWin HMI service (912/tcp) Contains two stack buffer overflow vulnerabilities. The first one is, SCPC_INITIALIZE() and SCPC_INITIALIZE_RF() In the function sprintf() Use, the second is SCPC_TXTEVENT() In the function strcpy() Due to the use of each.RealFlex RealWin HMI Service disruption by a third party with access to the service (DoS) An attacker may be attacked or execute arbitrary code. RealWin is a data acquisition and monitoring control system (SCADA) server product running on the Windows platform. - A boundary error occurred while processing the \"SCPC_INITIALIZE\" and \"SCPC_INITIALIZE_RF\" messages. Sending a specially constructed message to the TCP 912 port triggered a stack-based buffer overflow. - Handling \"SCPC_TXTEVENT\" messages with boundary errors, sending specially constructed messages to the TCP 912 port can trigger a stack-based buffer overflow. Failed exploit attempts will cause a denial-of-service condition. DATAC RealWin versions 2.0 and prior are vulnerable; other versions may also be affected. ---------------------------------------------------------------------- Windows Applications Insecure Library Loading The Official, Verified Secunia List: http://secunia.com/advisories/windows_insecure_library_loading/ The list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected. ---------------------------------------------------------------------- TITLE: RealWin Packet Processing Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA41849 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/41849/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=41849 RELEASE DATE: 2010-10-18 DISCUSS ADVISORY: http://secunia.com/advisories/41849/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/41849/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=41849 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Luigi Auriemma has discovered two vulnerabilities in RealWin, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. The vulnerabilities are confirmed in RealWin 2.1 Build 6.1.8.10. SOLUTION: Restrict network access to trusted users only. PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/realwin_1-adv.txt OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 5.4

sources: NVD: CVE-2010-4142 // CERT/CC: VU#222657 // JVNDB: JVNDB-2010-002532 // CNVD: CNVD-2010-2367 // CNVD: CNVD-2010-2654 // CNVD: CNVD-2010-2643 // BID: 44150 // IVD: 5bddcce8-1faa-11e6-abef-000c29c66e3d // IVD: 7d7eb28f-463f-11e9-90c2-000c29342cb1 // IVD: 354cdfc2-1fac-11e6-abef-000c29c66e3d // IVD: 7d79344f-463f-11e9-a630-000c29342cb1 // IVD: b50a7ff6-2355-11e6-abef-000c29c66e3d // IVD: 7d775f90-463f-11e9-bc81-000c29342cb1 // PACKETSTORM: 94927

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 3.0

sources: IVD: 5bddcce8-1faa-11e6-abef-000c29c66e3d // IVD: 7d7eb28f-463f-11e9-90c2-000c29342cb1 // IVD: 354cdfc2-1fac-11e6-abef-000c29c66e3d // IVD: 7d79344f-463f-11e9-a630-000c29342cb1 // IVD: b50a7ff6-2355-11e6-abef-000c29c66e3d // IVD: 7d775f90-463f-11e9-bc81-000c29342cb1 // CNVD: CNVD-2010-2367 // CNVD: CNVD-2010-2654 // CNVD: CNVD-2010-2643

AFFECTED PRODUCTS

vendor:realflexmodel:realwinscope:eqversion:1.06

Trust: 2.2

vendor:realflexmodel:realwinscope:eqversion:2.0

Trust: 2.2

vendor:microsoftmodel:realwin buildscope:eqversion:2.16.1.8.10

Trust: 1.0

vendor:datacmodel:control international realwin scada serverscope:eqversion:1.06

Trust: 0.9

vendor:datacmodel:control international realwin scada serverscope:eqversion:2.0

Trust: 0.9

vendor:realwinmodel: - scope:eqversion:1.06

Trust: 0.8

vendor:realwinmodel: - scope:eqversion:2.0

Trust: 0.8

vendor:realflexmodel: - scope: - version: -

Trust: 0.8

vendor:realflexmodel:realwinscope:ltversion:2.1.10 (2.1 build 6.1.10.10) earlier

Trust: 0.8

vendor:datacmodel:control international realwin scada serverscope:neversion:2.1.10

Trust: 0.3

sources: IVD: 5bddcce8-1faa-11e6-abef-000c29c66e3d // IVD: 7d7eb28f-463f-11e9-90c2-000c29342cb1 // IVD: 354cdfc2-1fac-11e6-abef-000c29c66e3d // IVD: 7d79344f-463f-11e9-a630-000c29342cb1 // IVD: b50a7ff6-2355-11e6-abef-000c29c66e3d // IVD: 7d775f90-463f-11e9-bc81-000c29342cb1 // CERT/CC: VU#222657 // CNVD: CNVD-2010-2367 // CNVD: CNVD-2010-2654 // CNVD: CNVD-2010-2643 // BID: 44150 // JVNDB: JVNDB-2010-002532 // CNNVD: CNNVD-201011-011 // NVD: CVE-2010-4142

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-4142
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#222657
value: 12.07

Trust: 0.8

NVD: CVE-2010-4142
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201011-011
value: CRITICAL

Trust: 0.6

IVD: 5bddcce8-1faa-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 7d7eb28f-463f-11e9-90c2-000c29342cb1
value: HIGH

Trust: 0.2

IVD: 354cdfc2-1fac-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: 7d79344f-463f-11e9-a630-000c29342cb1
value: CRITICAL

Trust: 0.2

IVD: b50a7ff6-2355-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 7d775f90-463f-11e9-bc81-000c29342cb1
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2010-4142
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2010-4142
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IVD: 5bddcce8-1faa-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 7d7eb28f-463f-11e9-90c2-000c29342cb1
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 354cdfc2-1fac-11e6-abef-000c29c66e3d
severity: NONE
baseScore: NONE
vectorString: NONE
accessVector: NONE
accessComplexity: NONE
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: UNKNOWN

Trust: 0.2

IVD: 7d79344f-463f-11e9-a630-000c29342cb1
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: b50a7ff6-2355-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 7d775f90-463f-11e9-bc81-000c29342cb1
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 5bddcce8-1faa-11e6-abef-000c29c66e3d // IVD: 7d7eb28f-463f-11e9-90c2-000c29342cb1 // IVD: 354cdfc2-1fac-11e6-abef-000c29c66e3d // IVD: 7d79344f-463f-11e9-a630-000c29342cb1 // IVD: b50a7ff6-2355-11e6-abef-000c29c66e3d // IVD: 7d775f90-463f-11e9-bc81-000c29342cb1 // CERT/CC: VU#222657 // JVNDB: JVNDB-2010-002532 // CNNVD: CNNVD-201011-011 // NVD: CVE-2010-4142

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2010-002532 // NVD: CVE-2010-4142

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201011-011

TYPE

Buffer overflow

Trust: 1.8

sources: IVD: 5bddcce8-1faa-11e6-abef-000c29c66e3d // IVD: 7d7eb28f-463f-11e9-90c2-000c29342cb1 // IVD: 354cdfc2-1fac-11e6-abef-000c29c66e3d // IVD: 7d79344f-463f-11e9-a630-000c29342cb1 // IVD: b50a7ff6-2355-11e6-abef-000c29c66e3d // IVD: 7d775f90-463f-11e9-bc81-000c29342cb1 // CNNVD: CNNVD-201011-011

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-002532

PATCH

title:RealFlex Online Support System (登録ユーザのみ)url:http://cs.realflex.com/cs/index.ssp

Trust: 0.8

title:Top Pageurl:http://www.realflex.com

Trust: 0.8

title:Patch for DATAC RealWin Stack Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/1586

Trust: 0.6

sources: CNVD: CNVD-2010-2643 // JVNDB: JVNDB-2010-002532

EXTERNAL IDS

db:NVDid:CVE-2010-4142

Trust: 4.7

db:SECUNIAid:41849

Trust: 4.3

db:BIDid:44150

Trust: 2.7

db:EXPLOIT-DBid:15337

Trust: 2.4

db:CERT/CCid:VU#222657

Trust: 1.9

db:EXPLOIT-DBid:15259

Trust: 1.6

db:CNNVDid:CNNVD-201011-011

Trust: 1.4

db:CNVDid:CNVD-2010-2643

Trust: 1.0

db:CNVDid:CNVD-2010-2367

Trust: 1.0

db:CNVDid:CNVD-2010-2654

Trust: 1.0

db:ICS CERTid:ICSA-10-313-01

Trust: 0.8

db:JVNDBid:JVNDB-2010-002532

Trust: 0.8

db:IVDid:5BDDCCE8-1FAA-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:7D7EB28F-463F-11E9-90C2-000C29342CB1

Trust: 0.2

db:IVDid:354CDFC2-1FAC-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:7D79344F-463F-11E9-A630-000C29342CB1

Trust: 0.2

db:IVDid:B50A7FF6-2355-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:7D775F90-463F-11E9-BC81-000C29342CB1

Trust: 0.2

db:PACKETSTORMid:94927

Trust: 0.1

sources: IVD: 5bddcce8-1faa-11e6-abef-000c29c66e3d // IVD: 7d7eb28f-463f-11e9-90c2-000c29342cb1 // IVD: 354cdfc2-1fac-11e6-abef-000c29c66e3d // IVD: 7d79344f-463f-11e9-a630-000c29342cb1 // IVD: b50a7ff6-2355-11e6-abef-000c29c66e3d // IVD: 7d775f90-463f-11e9-bc81-000c29342cb1 // CERT/CC: VU#222657 // CNVD: CNVD-2010-2367 // CNVD: CNVD-2010-2654 // CNVD: CNVD-2010-2643 // BID: 44150 // JVNDB: JVNDB-2010-002532 // PACKETSTORM: 94927 // CNNVD: CNNVD-201011-011 // NVD: CVE-2010-4142

REFERENCES

url:http://secunia.com/advisories/41849

Trust: 3.6

url:http://www.securityfocus.com/bid/44150

Trust: 2.4

url:http://www.exploit-db.com/exploits/15337

Trust: 1.6

url:http://www.exploit-db.com/exploits/15259

Trust: 1.6

url:http://aluigi.org/adv/realwin_1-adv.txt

Trust: 1.6

url:http://aluigi.altervista.org/adv/realwin_1-adv.txt

Trust: 1.2

url:http://www.kb.cert.org/vuls/id/222657

Trust: 1.1

url:http://www.us-cert.gov/control_systems/pdf/icsa-10-313-01.pdf

Trust: 0.8

url:http://www.exploit-db.com/exploits/15337/

Trust: 0.8

url:http://www.realflex.com/products/realwin/realwin.php

Trust: 0.8

url:http://cs.realflex.com/cs/index.ssp

Trust: 0.8

url:https://www.metasploit.com/redmine/projects/framework/repository/revisions/11067/entry/modules/exploits/windows/scada/realwin_10.rb

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4142

Trust: 0.8

url:http://jvn.jp/cert/jvnvu222657

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4142

Trust: 0.8

url:http://secunia.com/advisories/41849/

Trust: 0.7

url:http://www.realflex.com/

Trust: 0.3

url:http://www.dataconline.com/software/realwin.php

Trust: 0.3

url:http://www.realflex.com

Trust: 0.3

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/41849/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=41849

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/windows_insecure_library_loading/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#222657 // CNVD: CNVD-2010-2367 // CNVD: CNVD-2010-2654 // CNVD: CNVD-2010-2643 // BID: 44150 // JVNDB: JVNDB-2010-002532 // PACKETSTORM: 94927 // CNNVD: CNNVD-201011-011 // NVD: CVE-2010-4142

CREDITS

Luigi Auriemma

Trust: 0.9

sources: BID: 44150 // CNNVD: CNNVD-201011-011

SOURCES

db:IVDid:5bddcce8-1faa-11e6-abef-000c29c66e3d
db:IVDid:7d7eb28f-463f-11e9-90c2-000c29342cb1
db:IVDid:354cdfc2-1fac-11e6-abef-000c29c66e3d
db:IVDid:7d79344f-463f-11e9-a630-000c29342cb1
db:IVDid:b50a7ff6-2355-11e6-abef-000c29c66e3d
db:IVDid:7d775f90-463f-11e9-bc81-000c29342cb1
db:CERT/CCid:VU#222657
db:CNVDid:CNVD-2010-2367
db:CNVDid:CNVD-2010-2654
db:CNVDid:CNVD-2010-2643
db:BIDid:44150
db:JVNDBid:JVNDB-2010-002532
db:PACKETSTORMid:94927
db:CNNVDid:CNNVD-201011-011
db:NVDid:CVE-2010-4142

LAST UPDATE DATE

2025-04-11T23:02:13.149000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#222657date:2010-11-23T00:00:00
db:CNVDid:CNVD-2010-2367date:2010-10-19T00:00:00
db:CNVDid:CNVD-2010-2654date:2010-11-04T00:00:00
db:CNVDid:CNVD-2010-2643date:2010-11-03T00:00:00
db:BIDid:44150date:2010-11-19T18:26:00
db:JVNDBid:JVNDB-2010-002532date:2010-12-21T00:00:00
db:CNNVDid:CNNVD-201011-011date:2010-11-03T00:00:00
db:NVDid:CVE-2010-4142date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:5bddcce8-1faa-11e6-abef-000c29c66e3ddate:2010-11-03T00:00:00
db:IVDid:7d7eb28f-463f-11e9-90c2-000c29342cb1date:2010-10-19T00:00:00
db:IVDid:354cdfc2-1fac-11e6-abef-000c29c66e3ddate:2010-10-19T00:00:00
db:IVDid:7d79344f-463f-11e9-a630-000c29342cb1date:2010-11-04T00:00:00
db:IVDid:b50a7ff6-2355-11e6-abef-000c29c66e3ddate:2010-11-04T00:00:00
db:IVDid:7d775f90-463f-11e9-bc81-000c29342cb1date:2010-11-03T00:00:00
db:CERT/CCid:VU#222657date:2010-11-19T00:00:00
db:CNVDid:CNVD-2010-2367date:2010-10-19T00:00:00
db:CNVDid:CNVD-2010-2654date:2010-11-04T00:00:00
db:CNVDid:CNVD-2010-2643date:2010-11-03T00:00:00
db:BIDid:44150date:2010-10-15T00:00:00
db:JVNDBid:JVNDB-2010-002532date:2010-12-21T00:00:00
db:PACKETSTORMid:94927date:2010-10-18T03:06:45
db:CNNVDid:CNNVD-201011-011date:2010-11-03T00:00:00
db:NVDid:CVE-2010-4142date:2010-11-02T02:26:36.693