Check Point Reference: | CPAI-2012-093 |
Date Published: | 26 Mar 2012 |
Severity: | High |
Last Updated: | Friday 22 November, 2024 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Siemens SIMATIC WinCC flexible Runtime 2008 SP2 update 13 and prior |
Vulnerability Description | A stack buffer overflow vulnerability has been reported in Siemens SIMATIC WinCC Flexible. |
Vulnerability Details | The vulnerability is due to insufficient validation of user-supplied length value. A remote attacker may exploit this issue by sending a specially crafted request to an affected product. Successful exploitation could allow an attacker to execute arbitrary code in the security context of the affected application. |
This protection will detect and block attempts to transfer malicious requests.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Application Servers Protection Violation
Attack Information: Siemens SIMATIC WinCC Flexible Runtime stack buffer overflow