WellinTech KingSCADA < 'kxNetDispose.dll' Buffer Overflow RCE

Critical Nessus Plugin ID 81553


The WellinTech KingSCADA server installed on the remote host is affected by a remote code execution vulnerability.


The WellinTech KingSCADA server installed on the remote host is a version prior to It is, therefore, affected by a stack-based buffer overflow flaw in 'kxNetDispose.dll' due to improper validation of user-supplied input. A remote, unauthenticated attacker, by sending a specially crafted packet used for the calculation of copy operation sizes, can exploit this to cause the structured exception handler (SEH) to be overwritten, resulting in the execution of arbitrary code or a denial of service.


Upgrade KingSCADA to version

See Also



Plugin Details

Severity: Critical

ID: 81553

File Name: scada_kingscada_kxnetdispose_bof.nbin

Version: $Revision: 1.25 $

Type: local

Family: SCADA

Published: 2015/02/26

Modified: 2018/01/29

Dependencies: 59501

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:wellintech:kingscada

Required KB Items: installed_sw/WellinTech KingSCADA

Patch Publication Date: 2014/04/10

Vulnerability Publication Date: 2014/04/08

Reference Information

CVE: CVE-2014-0787

BID: 66709

OSVDB: 105574

ICSA: 14-098-02