An attacker could exploit this vulnerability to allow directory traversal on the host machine. That vulnerability is based on a previously reported vulnerability in the SafeNet Sentinel License Monitor service.
Langill reported a vulnerability in the SafeNet Sentinel License Monitor httpd 7.3 service on Port 6002/TCP, which is used by the ICONICS GENESIS32 and GENESIS64 application suites. After the aforementioned vulnerabilities were disclosed, a second, security researcher, Joel Langill of SCADAhacker, is coordinating with the ICS-CERT on another vulnerability in the ICONICS GENESIS products. The researcher states that the vulnerabilities fall within two classifications: twelve involve integer overflows one involves memory corruption. The 13 remotely exploitable vulnerabilities exploit the GenBroker.exe service on Port 38080/TCP. An independent security researcher has published 13 vulnerabilities with proof of concept (PoC) code for the ICONICS GENESIS32 and GENESIS64 human-machine interface (HMI)/supervisory control and data acquisition (SCADA) products. OVERVIEW This advisory is a follow-up to, published on the ICS-CERT Web site on March 20, 2011. But Sundar.C in a recent interview revealed how the movie did change his life.