Vulnerability Note VU#476345

Citect CitectSCADA ODBC service buffer overflow

Original Release date: 11 Jun 2008 | Last revised: 08 Oct 2008


Citect CitectSCADA contains a remotely accessible buffer overflow vulnerability which may allow a remote attacker to execute arbitrary code.


Citect CitectSCADA is software used for monitoring and control in Supervisory Control And Data Acquisition (SCADA) systems. A buffer overflow vulnerability exists in the CitectSCADA ODBC service. The ODBC Server listens on the network (20222/tcp) for service requests from clients. An attacker could exploit this vulnerability by sending specially crafted packets to a vulnerable CitectSCADA system. According to Core Security Technologies Advisory:

    Due to a lack of a proper length checking of the read data, a memory copy operation that uses as destination a buffer of fixed size allocated in the stack can be overflowed allowing an un-authenticated attacker to execute arbitrary code on vulnerable systems.
Note that this vulnerability affects versions of Citect CitectSCADA and CitectFacilities. Exploit code for this vulnerability is publicly available.


A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service.


Apply a patch

Supported Citect customers should contact Citect to receive a patch. For more information on contacting Citect visit

Restrict access

Restricting access to a vulnerable system by using host or network based firewalls may prevent a remote attacker from exploiting this vulnerability. For more information refer to Citect security article Securing Your SCADA Network.

Restricting access may result in loss of ODBC Server connectivity. According to Core Security Technologies Advisory:

    The vulnerability is located in the ODBC server service, vulnerable organizations that do not require ODBC connectivity may disable the service with no adverse effects to the CitectSCADA software. Installations that require ODBC connectivity to SQL databases, spreadsheets, etc. will suffer loss of connection with ODBC data sources if this workaround is applied. Vulnerable organizations should obtain positive verification that ODBC connectivity is not necessary in their installation and prepare appropriate contingency procedures before the workaround is applied.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
CitectAffected14 Apr 200806 Oct 2008
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Ivan Arce at Core Securities for information that was used in this report.

This document was written by Chris Taschner.

Other Information

  • CVE IDs: CVE-2008-2639
  • Date Public: 11 Jun 2008
  • Date First Published: 11 Jun 2008
  • Date Last Updated: 08 Oct 2008
  • Severity Metric: 7.35
  • Document Revision: 35


If you have feedback, comments, or additional information about this vulnerability, please send us email.