parent
807e2dfd31
commit
8817c0eee0
|
@ -16,11 +16,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Name' => 'ABB MicroSCADA wserver.exe Remote Code Execution',
|
||||
'Description' => %q{
|
||||
This module exploits a remote stack buffer overflow vulnerability in ABB MicroSCADA. The
|
||||
vulnerability exists on the wserver.exe component, disabled by default but required when
|
||||
a project uses the SCIL function WORKSTATION_CALL. The issue exists on the handling of
|
||||
EXECUTE operations, which allows unauthenticated execution of arbitrary commands. This
|
||||
module has been tested successfully on ABB MicroSCADA Pro SYS600 9.3 over Windows XP SP3
|
||||
and Windows 7 SP1.
|
||||
issue is due to the handling of unauthenticated EXECUTE operations on the wserver.exe
|
||||
component, which allows arbitrary commands. The component is disabled by default, but
|
||||
required when a project uses the SCIL function WORKSTATION_CALL.
|
||||
|
||||
This module has been tested successfully on ABB MicroSCADA Pro SYS600 9.3 over
|
||||
Windows XP SP3 and Windows 7 SP1.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
|
|
Loading…
Reference in New Issue