This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.
The remote Windows host contains a SCADA application that is affected
by a buffer overflow vulnerability.
The installed version of Winlog Lite or Winlog Pro from Sielco Sistemi
is earlier than 2.07.01 and thus reportedly has a buffer overflow in
its 'Runtime.exe' component that listens on TCP port 46823 if the 'Run
TCP/IP server' option is enabled for a project.
Using a specially crafted packet with opcode 0x02, an unauthenticated
remote attacker can leverage this issue to overflow a temporary stack
buffer of about 60 bytes and possibly execute arbitrary code.
See also :
Upgrade to Winlog version 2.07.01 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true
Nessus Plugin ID: 55631 ()
Bugtraq ID: 45813
CVE ID: CVE-2011-0517
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.