Check Point Reference: | CPAI-2011-277 |
Date Published: | 29 May 2011 |
Severity: | Critical |
Last Updated: | Sunday 29 May, 2011 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Siemens Tecnomatix FactoryLink is a Supervisory Control and Data Acquisition (SCADA) system used for monitoring and controlling industrial processes. A buffer overflow vulnerability have been reported in Siemens Tecnomatix FactoryLink SCADA system. The vulnerability is due to a boundary error in Siemens Tecnomatix FactoryLink CSService while handling file listing requests sent to the server. A remote attacker could exploit this issue by sending a specially crafted CSService Path message to the target server. Successful exploitation of this vulnerability would lead to stack buffer overflow that could lead to a denial of service condition and may lead to code injection and execution in the context of the affected server. |
This protection will detect and block specially crafted CSService Path messages to the target server.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: Siemens Tecnomatix FactoryLink SCADA CSService list path buffer overflow