CitectSCADA ODBC Server Remote Buffer Overflow

This script is Copyright (C) 2008-2014 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains an application that is affected by a
buffer overflow vulnerability.

Description :

The version of CitectSCADA installed on the remote host includes an
ODBC server that listens by default on TCP port 20222 and reportedly
is affected by a stack-buffer overflow vulnerability.

Using a specially-crafted sequence of packets, an unauthenticated
remote attacker who can connect to the server can leverage this issue
to crash the affected service or to execute code on the affected host
with SYSTEM-level privileges.

See also :

http://www.nessus.org/u?bc5c1ffc
http://www.securityfocus.com/archive/1/493272/30/0/threaded
http://www.nessus.org/u?38211051

Solution :

Either disable the ODBC server service or contact the vendor to obtain
Hotfix HF700R138255 (containing 'Client.dll' version 7.0.0.10025) and
apply that.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 33201 ()

Bugtraq ID: 29634

CVE ID: CVE-2008-2639