SCADA Engine BACnet OPC Client contains a buffer overflow when parsing .csv files. This vulnerability may allow an attacker to execute arbitrary code.
According to SCADA Engine website: "The SCADA Engine BACnet OPC Server is a server that provides data access (DA), Alarms and Events (AE), and Historical Data Access (HDA) between OPC clients and BACnet-compliant devices." SCADA Engine BACnet OPC Client contains a stack-based buffer overflow when parsing .csv files. The vulnerability is caused by a boundary error in the WTclient.dll library when preparing a status log message.
For additional information see ICS-CERT Advisory ICSA-10-264-01.
An attacker could exploit the vulnerability by tricking a user into opening a crafted .csv file, leading to execution of arbitrary code. Failed execution of this vulnerability may also lead to denial-of-service conditions.
Do not access .csv files from untrusted sources
SCADA Engine Affected
Updated: January 19, 2011
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Thanks to Jeremy Brown for reporting this vulnerability to ICS-CERT.
This document was written by Michael Orlando.
|Date First Published:||2011-02-03|
|Date Last Updated:||2011-02-03 18:10 UTC|