Langill reported a vulnerability in the SafeNet Sentinel License Monitor httpd 7.3 service on Port 6002/TCP, which is used by the ICONICS GENESIS32 and GENESIS64 application suites. The researcher states that the vulnerabilities fall within two classifications: twelve involve integer overflows one involves memory corruption.Īfter the aforementioned vulnerabilities were disclosed, a second, security researcher, Joel Langill of SCADAhacker, is coordinating with the ICS-CERT on another vulnerability in the ICONICS GENESIS products. The 13 remotely exploitable vulnerabilities exploit the GenBroker.exe service on Port 38080/TCP. An independent security researcher has published 13 vulnerabilities with proof of concept (PoC) code for the ICONICS GENESIS32 and GENESIS64 human-machine interface (HMI)/supervisory control and data acquisition (SCADA) products. OVERVIEW This advisory is a follow-up to, published on the ICS-CERT Web site on March 20, 2011. This is what I've learn from various website on how to get the sitekey for a software that protected with.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |