S-320: Citect CitectSCADA Vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-320: Citect CitectSCADA Vulnerability
# 1  
Old 06-19-2008
S-320: Citect CitectSCADA Vulnerability

Citect CitectSCADA contains a remotely accessible buffer overflow vulnerability which may allow a remote attacker to execute arbitrary code. The risk is MEDIUM. A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

How to install Linux on an external 320 gigabyte hard drive

Hi all, I would to know if I can install Linux on an external 320 gigabyte hard drive..I have Windows XP on my internal hard drive which is 80 GB , but this installation on 320 external HDD is for testing purpose If it is possible to install Linux on the external drive, will it cause any... (5 Replies)
Discussion started by: bsandeep_80
5 Replies

2. SCO

ultra 320 scsi raid controller driver for sco 5.0.6

I am facing a problem to install sco 5.0.6 in Dell Power Edge SC1420 which raid controller is ultra 320 scsi raid controller . how/from where to download the ultra 320 scsi raid controller driver for sco 5.0.6. Plz help with any idea karzon (1 Reply)
Discussion started by: karzon
1 Replies

3. SCO

configure Adaptec 29320ALP Ultra 320 SCSI Card in IBM X3400

I am installing SCO UNIX 5.0.6 in X3400, every thing are install except Adaptec 29320ALP Card (Attached DAT Drive) because their driver are available in btld formate Fllopy DISk and SCO Unix 5.0.6 not support USB Floppy, Can anybody inform us any other method to installed the Adaptec Ultra 120... (3 Replies)
Discussion started by: hafizurr
3 Replies
Login or Register to Ask a Question
uuxqt(1M)						  System Administration Commands						 uuxqt(1M)

NAME
uuxqt - execute remote command requests SYNOPSIS
/usr/lib/uucp/uuxqt [-s system] [-x debug-level] DESCRIPTION
uuxqt is the program that executes remote job requests from remote systems generated by the use of the uux command. (mail uses uux for remote mail requests). uuxqt searches the spool directories looking for execution requests. For each request, uuxqt checks to see if all the required data files are available, accessible, and the requested commands are permitted for the requesting system. The Permissions file is used to validate file accessibility and command execution permission. There are two environment variables that are set before the uuxqt command is executed: o UU_MACHINE is the machine that sent the job (the previous one). o UU_USER is the user that sent the job. These can be used in writing commands that remote systems can execute to provide information, auditing, or restrictions. OPTIONS
The following options are supported: -s system Specifies the remote system name. -x debug-level debug-level is a number from 0 to 9. Higher numbers give more detailed debugging information. FILES
/etc/uucp/Limits /etc/uucp/Permissions /var/spool/locks/* /var/spool/uucp/* ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWbnuu | +-----------------------------+-----------------------------+ SEE ALSO
mail(1), uucp(1C), uustat(1C), uux(1C), uucico(1M), attributes(5) SunOS 5.10 19 May 1993 uuxqt(1M)