Directory traversal vulnerability in dc.exe 9.00.00.11059 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allows remote attackers to execute arbitrary programs via ..\ (dot dot backslash) sequences in opcodes (1) 0xa and (2) 0x17 to TCP port 12397.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/46936 | vdb entry exploit |
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-03.pdf | us government resource |
http://aluigi.org/adv/igss_8-adv.txt | |
http://secunia.com/advisories/43849 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2011/0741 | vdb entry vendor advisory |
http://www.exploit-db.com/exploits/17024 | exploit |