Sielco Sistemi Winlog < 2.07.18 Multiple Vulnerabilities

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

A SCADA application on the remote host is affected by multiple
vulnerabilities.

Description :

The remote host has a version of Sielco Sistemi Winlog prior to
2.07.18 that is affected by the following vulnerabilities:

- A buffer overflow vulnerability exists in RunTime.exe
could allow an attacker to execute arbitrary code on the
remote host. It can be triggered by sending specially
crafted packets to port 46824. (CVE-2012-3815)

- There are multiple buffer overflows that can be
triggered by sending a specially crafted packet with a
negative integer after an opcode to port 46824. This
may give attackers the ability to execute arbitrary
code. (CVE-2012-4355, CVE-2012-4358)

See also :

http://aluigi.altervista.org/adv/winlog_2-adv.txt

Solution :

Upgrade to WinLog 2.07.18 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 61494 ()

Bugtraq ID: 53811
54212

CVE ID: CVE-2012-4355
CVE-2012-4359
CVE-2012-3815