Sielco Sistemi Winlog Pro < 2.07.01 TCP/IP Server Runtime.exe Packet Handling Remote Overflow

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a SCADA application that is affected
by a buffer overflow vulnerability.

Description :

The installed version of Winlog Lite or Winlog Pro from Sielco Sistemi
is earlier than 2.07.01 and thus reportedly has a buffer overflow in
its 'Runtime.exe' component that listens on TCP port 46823 if the 'Run
TCP/IP server' option is enabled for a project.

Using a specially crafted packet with opcode 0x02, an unauthenticated
remote attacker can leverage this issue to overflow a temporary stack
buffer of about 60 bytes and possibly execute arbitrary code.

See also :

http://aluigi.org/adv/winlog_1-adv.txt
http://www.winlog.it/forum/viewtopic.php?f=22&t=136

Solution :

Upgrade to Winlog version 2.07.01 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 55631 ()

Bugtraq ID: 45813

CVE ID: CVE-2011-0517