Executive Summary

Informations
Name CVE-2010-4142 First vendor Publication 2010-11-01
Vendor Cve Last vendor Modification 2010-11-04

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple stack-based buffer overflows in DATAC RealWin 2.0 Build 6.1.8.10 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) SCPC_INITIALIZE, (2) SCPC_INITIALIZE_RF, or (3) SCPC_TXTEVENT packet. NOTE: it was later reported that 1.06 is also affected by one of these requests.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4142

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2

SAINT Exploits

Description Link
DATAC RealWin SCADA Server SCPC_INITIALIZE buffer overflow More info here

OpenVAS Exploits

Date Description
2010-11-02 Name : RealWin SCADA System Buffer Overflow Vulnerabilities
File : nvt/gb_realwin_scada_bof_vuln.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
68812 DATAC RealWin Multiple Packet Type Processing Overflow

RealWin is prone to an overflow condition. The program fails to properly sanitize user-supplied input resulting in a stack-based buffer overflow. With a specially crafted 'SCPC_INITIALIZE', 'SCPC_INITIALIZE_RF' or 'SCPC_TXTEVENT' packet, a remote attacker can potentially execute arbitrary code.

Snort® IPS/IDS

Date Description
2014-01-10 RealWin 2.1 SCPC_INITIALIZE overflow attempt
RuleID : 18659 - Revision : 9 - Type : PROTOCOL-SCADA
2014-01-10 RealWin SPC_TXTEVENT oversized packet buffer overflow
RuleID : 18290 - Revision : 2 - Type : SCADA
2014-01-10 RealWin SPC_INITIALIZE_RF oversized packet buffer overflow
RuleID : 18289 - Revision : 2 - Type : SCADA
2014-01-10 RealWin SPC_INITIALIZE oversized packet buffer overflow
RuleID : 18288 - Revision : 2 - Type : SCADA

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/44150
EXPLOIT-DB http://www.exploit-db.com/exploits/15259
http://www.exploit-db.com/exploits/15337
MISC http://aluigi.org/adv/realwin_1-adv.txt
SECUNIA http://secunia.com/advisories/41849

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2021-05-04 12:12:51
  • Multiple Updates
2021-04-22 01:13:25
  • Multiple Updates
2020-05-23 13:16:56
  • Multiple Updates
2020-05-23 00:26:51
  • Multiple Updates
2016-04-26 20:13:03
  • Multiple Updates
2014-01-19 21:27:17
  • Multiple Updates
2013-05-10 23:36:25
  • Multiple Updates