IntelliCom NetBiter Hostname Buffer Overflow
Intellicom NetBiter webSCADA is an embedded Supervisory Control and Data Acquisition solution for various hardware devices, providing remote management through web browsers. NetBiter Config is a configuration utility shipped with NetBiter webSCADA. It is used to enumerate and configure compatible devices on the LAN.
NetBiter Config uses HICP protocol to communicate with the devices. The HICP protocol is a proprietary protocol used to control managed devices in a SCADA environment. The protocol uses UDP/3250 port and contain key=value pairs in plain text, separated by semicolons:
key = value ; key = value ; [...]
The following keys are known:
Configure: xx-xx-xx-xx-xx-xx; Protocol version =; fb type = ; module version = mac = xx-xx-xx-xx-xx-xx; hn = ; ip = XXX.XXX.XXX.XXX; sn = XXX.XXX.XXX.XXX; gw = XXX.XXX.XXX.XXX; dhcp = ; pswd = off; dns1 = XXX.XXX.XXX.XXX; dns2 = XXX.XXX.XXX.XXX; password = ; new password = ;
A stack buffer overflow vulnerability exists in Intellicom NetBiter Config utility. The vulnerability is due to missing bounds checking on the value of
SonicWALL UTM team has researched on this vulnerability and released the following IPS signature:
- 3019 IntelliCom NetBiter HICP Hostname BO Attempt
This vulnerability is disclosed by the vendor’s advisory