search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Citect CitectSCADA ODBC service buffer overflow

Vulnerability Note VU#476345

Original Release Date: 2008-06-11 | Last Revised: 2008-10-08

Overview

Citect CitectSCADA contains a remotely accessible buffer overflow vulnerability which may allow a remote attacker to execute arbitrary code.

Description

Citect CitectSCADA is software used for monitoring and control in Supervisory Control And Data Acquisition (SCADA) systems. A buffer overflow vulnerability exists in the CitectSCADA ODBC service. The ODBC Server listens on the network (20222/tcp) for service requests from clients. An attacker could exploit this vulnerability by sending specially crafted packets to a vulnerable CitectSCADA system. According to Core Security Technologies Advisory:


    Due to a lack of a proper length checking of the read data, a memory copy operation that uses as destination a buffer of fixed size allocated in the stack can be overflowed allowing an un-authenticated attacker to execute arbitrary code on vulnerable systems.
Note that this vulnerability affects versions of Citect CitectSCADA and CitectFacilities. Exploit code for this vulnerability is publicly available.

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service.

Solution

Apply a patch

Supported Citect customers should contact Citect to receive a patch. For more information on contacting Citect visit http://www.citect.com/index.php?option=com_content&task=view&id=1374&Itemid=223.

Restrict access


Restricting access to a vulnerable system by using host or network based firewalls may prevent a remote attacker from exploiting this vulnerability. For more information refer to Citect security article Securing Your SCADA Network.

Restricting access may result in loss of ODBC Server connectivity. According to Core Security Technologies Advisory:

    The vulnerability is located in the ODBC server service, vulnerable organizations that do not require ODBC connectivity may disable the service with no adverse effects to the CitectSCADA software. Installations that require ODBC connectivity to SQL databases, spreadsheets, etc. will suffer loss of connection with ODBC data sources if this workaround is applied. Vulnerable organizations should obtain positive verification that ODBC connectivity is not necessary in their installation and prepare appropriate contingency procedures before the workaround is applied.

Vendor Information

476345
Expand all

Citect

Notified:  April 14, 2008 Updated:  October 06, 2008

Status

  Vulnerable

Vendor Statement

Citect advises supported customers concerned about this reported issue to contact Citect Global Support Centre for related security advice and to receive the patch if required. Customers can navigate to http://www.citect.com/index.php?option=com_content&task=view&id=1374&Itemid=223 for advice on how to contact Support via telephone, facsimile, email or the Web portal.

Vendor Information

See also http://www.citect.com/documents/news_and_media/pr-citect-address-security.pdf and http://knowledgebase.citect.com/SafetyandSecurity/.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

Thanks to Ivan Arce at Core Securities for information that was used in this report.

This document was written by Chris Taschner.

Other Information

CVE IDs: CVE-2008-2639
Severity Metric: 7.35
Date Public: 2008-06-11
Date First Published: 2008-06-11
Date Last Updated: 2008-10-08 21:02 UTC
Document Revision: 35

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.