parent
807e2dfd31
commit
8817c0eee0
|
@ -16,11 +16,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'Name' => 'ABB MicroSCADA wserver.exe Remote Code Execution',
|
'Name' => 'ABB MicroSCADA wserver.exe Remote Code Execution',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a remote stack buffer overflow vulnerability in ABB MicroSCADA. The
|
This module exploits a remote stack buffer overflow vulnerability in ABB MicroSCADA. The
|
||||||
vulnerability exists on the wserver.exe component, disabled by default but required when
|
issue is due to the handling of unauthenticated EXECUTE operations on the wserver.exe
|
||||||
a project uses the SCIL function WORKSTATION_CALL. The issue exists on the handling of
|
component, which allows arbitrary commands. The component is disabled by default, but
|
||||||
EXECUTE operations, which allows unauthenticated execution of arbitrary commands. This
|
required when a project uses the SCIL function WORKSTATION_CALL.
|
||||||
module has been tested successfully on ABB MicroSCADA Pro SYS600 9.3 over Windows XP SP3
|
|
||||||
and Windows 7 SP1.
|
This module has been tested successfully on ABB MicroSCADA Pro SYS600 9.3 over
|
||||||
|
Windows XP SP3 and Windows 7 SP1.
|
||||||
},
|
},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
|
Loading…
Reference in New Issue