Create a malicious DLL and rename as anyone of the below DLL's.
UxTheme.dll
CtComDlgENU.dll
CtComDlgLOC.dll
CTPROJENU.dll
CTPROJLOC.dll
CRYPTBASE.dll
SspiCli.dll
profapi.dll
dnsapi.dll
located at
C:\Program Files\Schneider Electric\CitectSCADA 7.40\Bin\
Vulnerable Process Name, CtExplor.exe
The malicious DLL's will have arbitrary code written by attacker.

Tested on OS: Windows 7 Ultimate N SP1
Schneider Electric CitectSCADA 7.40

Best Regards,
Praveen Darshanam
http://blog.disects.com

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Reply via email to