what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Procyon Core Server 1.06 Code Execution

Procyon Core Server 1.06 Code Execution
Posted Oct 13, 2011
Authored by Knud | Site nsense.fi

nSense Vulnerability Research Security Advisory - The coreservice.exe process in Procyon core server versions 1.06 and below contains a remotely exploitable memory corruption flaw which allows for remote code execution. The affected component is coreservice.exe, which listens on port 23, running as SYSTEM. Sending a long string will trigger the overflow.

tags | advisory, remote, overflow, code execution
SHA-256 | 922acef938ae8deb176229f5e0792d09103f2de6f8e5b7312b17de91b92ff373

Procyon Core Server 1.06 Code Execution

Change Mirror Download
      nSense Vulnerability Research Security Advisory NSENSE-2011-005
---------------------------------------------------------------

Affected Vendor: Scadatec
Affected Product: Procyon core server <=1.06
Platform: Windows
Impact: Remote code execution
Vendor response: New version released
CVE: None
Credit: Knud / nSense

Technical details
---------------------------------------------------------------
The coreservice.exe process contains a remotely exploitable
memory corruption flaw which allows for remode code execution.
The affected component is coreservice.exe, which listens on port
23, running as SYSTEM. Sending a long string will trigger the
overflow.

Timeline:
20110412 Contacted ICS-CERT
20110527 Vendor communicates with ICS-CERT, working on fix
20110720 Independtly rediscovered by Steven Seeley/Stratsec
20110708 ICS-CERT provides link to fixed version
20110708 nSense validates fix is working as intended
20110804 ICS-CERT releases advisory to US-CERT portal
20110907 ICS-CERT releases public advisory

Solution
Contact the vendor for an updated version:
http://www.scadatec.co.uk/

Links:
http://www.nsense.fi http://www.nsense.dk



$$s$$$$s. ,s$$$$s ,S$$$$$s. $$s$$$$s. ,s$$$$s ,S$$$$$s.
$$$ `$$$ ($$( $$$ `$$$ $$$ `$$$ ($$( $$$ `$$$
$$$ $$$ `^$$s. $$$$$$$$$ $$$ $$$ `^$$s. $$$$$$$$$
$$$ $$$ )$$) $$$ $$$ $$$ )$$) $$$
$$$ $$$ ^$$$$$$7 `7$$$$$P $$$ $$$ ^$$$$$$7 `7$$$$$P

D r i v e n b y t h e c h a l l e n g e _

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close