Overview
Citect CitectSCADA contains a remotely accessible buffer overflow vulnerability which may allow a remote attacker to execute arbitrary code.
Description
Citect CitectSCADA is software used for monitoring and control in Supervisory Control And Data Acquisition (SCADA) systems. A buffer overflow vulnerability exists in the CitectSCADA ODBC service. The ODBC Server listens on the network (20222/tcp) for service requests from clients. An attacker could exploit this vulnerability by sending specially crafted packets to a vulnerable CitectSCADA system. According to Core Security Technologies Advisory: Due to a lack of a proper length checking of the read data, a memory copy operation that uses as destination a buffer of fixed size allocated in the stack can be overflowed allowing an un-authenticated attacker to execute arbitrary code on vulnerable systems. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service. |
Solution
Apply a patch Supported Citect customers should contact Citect to receive a patch. For more information on contacting Citect visit http://www.citect.com/index.php?option=com_content&task=view&id=1374&Itemid=223. |
Restrict access
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.citect.com/index.php?option=com_content&task=view&id=186&Itemid=322
- http://www.citect.com/index.php?option=com_content&task=view&id=26&Itemid=29
- http://www.citect.com/documents/news_and_media/pr-citect-address-security.pdf
- http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=2186
- http://secunia.com/advisories/30638/
- http://www.securityfocus.com/bid/29634/discuss
- http://news.infracritical.com/pipermail/scadasec/2008-September/001503.html
- http://www.digitalmunition.com/5ws_of_Citect_ODBC.txt
- http://www.digitalmunition.com/citect_scada_odbc.rb
- http://www.milw0rm.com/exploits/6387
- http://www.milw0rm.com/papers/221
- http://www.citect.com/index.php?option=com_content&task=view&id=1374&Itemid=223
- http://www.citect.com/documents/news_and_media/CitectSCADA-security-response.pdf
- http://www.csoonline.com/article/print/448626
- http://www.pcworld.com/businesscenter/article/150888/computer_threat_for_industrial_systems_now_more_serious.html
- http://www.theregister.co.uk/2008/09/19/scada_advisory_pulled/
- http://www.citect.com/index.php?option=com_content&task=view&id=1374&Itemid=223
- http://knowledgebase.citect.com/SafetyandSecurity/
- http://www.digitalbond.com/wiki/index.php/CitectSCADA_Stack_Overflow_Vulnerability
Acknowledgements
Thanks to Ivan Arce at Core Securities for information that was used in this report.
This document was written by Chris Taschner.
Other Information
CVE IDs: | CVE-2008-2639 |
Severity Metric: | 7.35 |
Date Public: | 2008-06-11 |
Date First Published: | 2008-06-11 |
Date Last Updated: | 2008-10-08 21:02 UTC |
Document Revision: | 35 |