


AFFECTED PRODUCTS The Integer overflows and Memory Corruption vulnerabilities affect ICONICS GENESIS32 and GENESIS64. ICS-CERT has verified that the update released by ICONICS fully addresses all reported vulnerabilities. ICONICS has validated the reported vulnerabilities and released a software update that addresses all identified vulnerabilities. An attacker could exploit this vulnerability to allow directory traversal on the host machine. That vulnerability is based on a previously reported vulnerability in the SafeNet Sentinel License Monitor service. Langill reported a vulnerability in the SafeNet Sentinel License Monitor httpd 7.3 service on Port 6002/TCP, which is used by the ICONICS GENESIS32 and GENESIS64 application suites. The researcher states that the vulnerabilities fall within two classifications: twelve involve integer overflows one involves memory corruption.Īfter the aforementioned vulnerabilities were disclosed, a second, security researcher, Joel Langill of SCADAhacker, is coordinating with the ICS-CERT on another vulnerability in the ICONICS GENESIS products. The 13 remotely exploitable vulnerabilities exploit the GenBroker.exe service on Port 38080/TCP. An independent security researcher has published 13 vulnerabilities with proof of concept (PoC) code for the ICONICS GENESIS32 and GENESIS64 human-machine interface (HMI)/supervisory control and data acquisition (SCADA) products. OVERVIEW This advisory is a follow-up to, published on the ICS-CERT Web site on March 20, 2011. This is what I've learn from various website on how to get the sitekey for a software that protected with.
