|
|||
Rule General Information |
---|
Release Date: | 2019-07-02 | |
Rule Name: | Intellicom Netbiter Hostname Stack Buffer Overflow Vulnerability (CVE-2009-4462) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Stack-based buffer overflow in the NetBiterConfig utility (NetBiterConfig.exe) 1.3.0 for Intellicom NetBiter WebSCADA allows remote attackers to execute arbitrary code via a long hn (hostname) parameter in a crafted HICP-protocol UDP packet. | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityFocusBID:37325 http://blog.48bits.com/2009/12/12/exposing-hms-hicp-protocol-0day-light/ http://reversemode.com/index.php?option=com_content&task=view&id=65&Itemid=1 http://support.intellicom.se/getfile.cfm?FID=150&FPID=85 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://www.intellicom.se/webscada.cfm |