Netbiter Config NetbiterConfig.exe Device Hostname Remote Overflow

High Nessus Plugin ID 43614


The remote Windows host contains a program that is affected by a buffer overflow vulnerability.


The Netbiter Config utility is installed on the remote Windows host.
It is a configuration utility used to query and set TCP/IP network settings in NetBiter WebSCADA devices.

According to its version, the installed version of this utility does not properly handle specially crafted UDP packets with values of the 'hn' parameter longer than 32 bytes.

An anonymous remote attacker may be able to exploit this issue to overflow the application's stack and thereby execute arbitrary code subject to the privileges of the user who launched the utility. Note, though, that the flaw is reportedly triggered only when the user double-clicks on a list-box item.


Upgrade to Netbiter Config version 1.3.1 or later.

See Also

Plugin Details

Severity: High

ID: 43614

File Name: netbiter_config_hostname_overflow.nbin

Version: $Revision: 1.83 $

Type: local

Family: SCADA

Published: 2009/12/30

Modified: 2018/02/14

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/12/18

Vulnerability Publication Date: 2009/12/14

Reference Information

CVE: CVE-2009-4462

BID: 37325

OSVDB: 61018

CERT: 181737

Secunia: 37695

CWE: 119