Vulnerability Note VU#476345
Citect CitectSCADA ODBC service buffer overflow
Citect CitectSCADA contains a remotely accessible buffer overflow vulnerability which may allow a remote attacker to execute arbitrary code.
Citect CitectSCADA is software used for monitoring and control in Supervisory Control And Data Acquisition (SCADA) systems. A buffer overflow vulnerability exists in the CitectSCADA ODBC service. The ODBC Server listens on the network (20222/tcp) for service requests from clients. An attacker could exploit this vulnerability by sending specially crafted packets to a vulnerable CitectSCADA system. According to Core Security Technologies Advisory:
Due to a lack of a proper length checking of the read data, a memory copy operation that uses as destination a buffer of fixed size allocated in the stack can be overflowed allowing an un-authenticated attacker to execute arbitrary code on vulnerable systems.
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service.
Apply a patch
Supported Citect customers should contact Citect to receive a patch. For more information on contacting Citect visit http://www.citect.com/index.php?option=com_content&task=view&id=1374&Itemid=223.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Citect||Affected||14 Apr 2008||06 Oct 2008|
CVSS Metrics (Learn More)
Thanks to Ivan Arce at Core Securities for information that was used in this report.
This document was written by Chris Taschner.
- CVE IDs: CVE-2008-2639
- Date Public: 11 Jun 2008
- Date First Published: 11 Jun 2008
- Date Last Updated: 08 Oct 2008
- Severity Metric: 7.35
- Document Revision: 35
If you have feedback, comments, or additional information about this vulnerability, please send us email.