First published: Thu Sep 15 2011(Updated: )
Heap-based buffer overflow in the Siemens WinCC Runtime Advanced Loader, as used in SIMATIC WinCC flexible Runtime and SIMATIC WinCC (TIA Portal) Runtime Advanced, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted packet to TCP port 2308.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens WinCC flexible runtime | ||
Siemens SIMATIC WinCC Runtime Advanced |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3321 has a high severity, as it allows remote attackers to exploit a heap-based buffer overflow leading to memory corruption or arbitrary code execution.
To mitigate CVE-2011-3321, ensure that you update to the latest versions of Siemens SIMATIC WinCC flexible Runtime and SIMATIC WinCC Runtime that address this vulnerability.
CVE-2011-3321 affects Siemens SIMATIC WinCC flexible Runtime and SIMATIC WinCC (TIA Portal) Runtime Advanced installations.
Attackers can exploit CVE-2011-3321 to cause a denial of service or potentially execute arbitrary code by sending crafted packets to the TCP service.
Yes, CVE-2011-3321 remains a threat if the affected software is not patched or updated, potentially exposing systems to attacks.