WonderWare is supplier of industrial automation and information software solutions. According to the company's website:

* one third of the world's plants run Wonderware software solutions. Having sold more than 500,000 software licenses in over 100,000 plants worldwide, Wonderware has customers in virtually every global industry - including Oil and Gas, Food and Beverage, Utilities, Pharmaceuticals, Electronics, Metals, Automotive and more



The vulnerability found in Wonderware SuiteLink Service (slssvc.exe) could allow an un-authenticated remote attacker with the ability to connect to the SuiteLink service TCP port to shutdown the service abnormally by sending a malformed packet.
By sending a malformed 'Directory' request it is possible to create a condition where free() is called on memory that is still in use. This can result in an exploitable condition when free() is called on the memory chunk a second time.



The agent installed by this exploit runs with administrative privileges.



This update improve the exploit reliability.
This module exploits a buffer overflow in SurgeMail Mail Server and installs an agent into the target host. A buffer overflow vulnerability is located in the function which handles the real CGI executables. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to this module.

This exploit perform three attempts to disable DEP in XP SP2 and Windows 2003.