SCADA: DATAC RealWin SCADA Server

This signature detects attempts to exploit a known vulnerability in the DATAC RealWin SCADA Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

DATAC RealWin SCADA server is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the affected application. This may facilitate the complete compromise of affected computers. Failed exploit attempts may result in a denial-of-service condition. RealWin SCADA server 2.0 is affected; other versions may also be vulnerable.

Affected Products

Datac_control_international realwin_scada_server

Short Name
SCADA:REALWIN
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
SCADA
Keywords
CVE-2008-4322 CVE-2010-4142 DATAC RealWin SCADA Server bid:31418
Release Date
09/30/2008
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3729
Port
TCP/910
False Positive
Unknown
Vendors

Datac_control_international

CVSS Score

10.0

Found a potential security threat?