CVE-2009-4462

Stack-based buffer overflow in the NetBiterConfig utility (NetBiterConfig.exe) 1.3.0 for Intellicom NetBiter WebSCADA allows remote attackers to execute arbitrary code via a long hn (hostname) parameter in a crafted HICP-protocol UDP packet.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:intellicom:netbiterconfig:1.3.0:*:*:*:*:*:*:*
OR cpe:2.3:h:intellicom:netbiter_webscada_ws100:*:*:*:*:*:*:*:*
cpe:2.3:h:intellicom:netbiter_webscada_ws200:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:09

Type Values Removed Values Added
References () http://blog.48bits.com/2009/12/12/exposing-hms-hicp-protocol-0day-light/ - () http://blog.48bits.com/2009/12/12/exposing-hms-hicp-protocol-0day-light/ -
References () http://reversemode.com/index.php?option=com_content&task=view&id=65&Itemid=1 - Exploit () http://reversemode.com/index.php?option=com_content&task=view&id=65&Itemid=1 - Exploit
References () http://support.intellicom.se/getfile.cfm?FID=150&FPID=85 - () http://support.intellicom.se/getfile.cfm?FID=150&FPID=85 -
References () http://www.kb.cert.org/vuls/id/181737 - US Government Resource () http://www.kb.cert.org/vuls/id/181737 - US Government Resource
References () http://www.securityfocus.com/archive/1/508449/100/0/threaded - () http://www.securityfocus.com/archive/1/508449/100/0/threaded -
References () http://www.securityfocus.com/bid/37325 - () http://www.securityfocus.com/bid/37325 -
References () http://www.vupen.com/english/advisories/2009/3542 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/3542 - Vendor Advisory

Information

Published : 2009-12-30 20:00

Updated : 2024-11-21 01:09


NVD link : CVE-2009-4462

Mitre link : CVE-2009-4462

CVE.ORG link : CVE-2009-4462


JSON object : View

Products Affected

intellicom

  • netbiterconfig
  • netbiter_webscada_ws200
  • netbiter_webscada_ws100
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer