This is a paper detailing the Five Ws of the Citect ODBC vulnerability that affects Citect versions 5, 6, and 7.
964dabad19a7f4cc68531d84e4b801807359a6d0cc916ab14e3874c422b8c097
This Metasploit module exploits a stack overflow in CitectSCADA's ODBC daemon. This has only been tested against Citect versions 5, 6, and 7.
4b8827fd3066f46018ff90f1daa741907933623b3c2e871114a59e4b146524c0
Core Security Technologies Advisory - A vulnerability was found in CitectSCADA that could allow a remote un-authenticated attacker to force an abnormal termination of the vulnerable software (Denial of Service) or to execute arbitrary code on vulnerable systems to gain complete control of the software. To accomplish such goal the would-be attacker must be able to connect to the vulnerable service on a TCP high-port.
19bd45b897c6982edbb11d71c9c88e4b43443d02180be90c94917a52bf3de427