header-logo
Suggest Exploit
vendor:
RealWin
by:
Luigi Auriemma
7.5
CVSS
HIGH
Stack Overflow
121, 122
CWE
Product Name: RealWin
Affected Version From: <= 2.0 (Build 6.1.8.10)
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows
2010

DATAC RealWin Stack Overflow Vulnerabilities

The DATAC RealWin SCADA server package for medium/small applications is vulnerable to two stack overflow vulnerabilities. The first vulnerability occurs in the SCPC_INITIALIZE and SCPC_INITIALIZE_RF functions, where a stack-based buffer overflow is caused by the usage of sprintf(). The second vulnerability occurs in the SCPC_TXTEVENT function, where a stack-based overflow is caused by the usage of strcpy() with data supplied by the attacker.

Mitigation:

Upgrade to a version later than 2.0 (Build 6.1.8.10)
Source

Exploit-DB raw data:

Source: http://aluigi.org/adv/realwin_1-adv.txt

#######################################################################

                             Luigi Auriemma

Application:  DATAC RealWin
              http://www.dataconline.com/software/realwin.php
              http://www.realflex.com
Versions:     <= 2.0 (Build 6.1.8.10)
Platforms:    Windows
Bugs:         A] stack overflow in SCPC_INITIALIZE and SCPC_INITIALIZE_RF
              B] stack overflow in SCPC_TXTEVENT
Exploitation: remote, versus server
Date:         15 Oct 2010
Author:       Luigi Auriemma
              e-mail: aluigi@autistici.org
              web:    aluigi.org


#######################################################################


1) Introduction
2) Bugs
3) The Code
4) Fix


#######################################################################

===============
1) Introduction
===============


"RealWin is a SCADA server package for medium / small applications."


#######################################################################

=======
2) Bugs
=======


-----------------------------------------------------------
A] stack overflow in SCPC_INITIALIZE and SCPC_INITIALIZE_RF
-----------------------------------------------------------

The service of the server running on port 912 is vulnerable to a
stack based buffer-overflow caused by the usage of sprintf() for
building a particular string with the data supplied by the attacker:

  sprintf(
    stack_buffer,
    "C:\\Program Files\\...path_of_RealWin...\\data\\crt\\fwd\\tel\\%s.%d",
    attacker_string,
    attacker_16bit_number);


----------------------------------
B] stack overflow in SCPC_TXTEVENT
----------------------------------

The same server is vulnerable also to another stack based overflow
caused by the usage of strcpy() with the data supplied by the attacker.


#######################################################################

===========
3) The Code
===========


http://aluigi.org/poc/realwin_1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15259.zip (realwin_1.zip)

  nc SERVER 912 < realwin_1a.dat
  nc SERVER 912 < realwin_1b.dat
  nc SERVER 912 < realwin_1c.dat


#######################################################################

======
4) Fix
======


No fix.


#######################################################################