ICS Alert

WellinTech KingView Buffer Overflow

Last Revised
Alert Code
ICS-ALERT-11-011-01

Description

ICS-CERT has become aware of public reports of a vulnerability in WellinTech KingView v6.53, which could be exploited by remote attackers to take control of a vulnerable system.

table.gridtable {
font-family: verdana,arial,sans-serif;
font-size:11px;
color:#333333;
border-width: 1px;
border-color: #666666;
border-collapse: collapse;
}
table.gridtable th {
border-width: 1px;
padding: 8px;
border-style: solid;
border-color: #666666;
background-color: #dedede;
}
table.gridtable td {
border-width: 1px;
padding: 8px;
border-style: solid;
border-color: #666666;
background-color: #ffffff;
}

SUMMARY

ICS-CERT has become aware of public reports of a vulnerability in WellinTech KingView v6.53, which could be exploited by remote attackers to take control of a vulnerable system. This issue is caused by a buffer overflow vulnerability in the "HistorySvr.exe" module when processing packets sent to Port 777/TCP. This could be exploited by remote unauthenticated attackers to crash an affected application or execute arbitrary code. Exploit code has been published.

According to the WellinTech website, KingView is widely used in power, water, building automation, mining, and other sectors, with most customers in China. It is also used in the Chinese aerospace industry. ICS-CERT has not yet verified this vulnerability.

ICS-CERT is providing this information as an immediate notification of new activity and is currently working with the CERT Coordination Center (CERT/CC) and US-CERT. Further information will be released as it becomes available.

Mitigations

FOLLOW-UP

ICS-CERT released vulnerability details and mitigation recommendations in the follow-up advisory, ICSA-11-017-01 Ecava Kingview Buffer Overflow, on January 17, 2011.

This product is provided subject to this Notification and this Privacy & Use policy.

Vendor

WellinTech