This indicates an attack attempt against a buffer-overflow vulnerability in Realflex RealWin Scada Server.
The vulnerability is caused by improper bounds checking in the "INFOTAG_SET_CONTROL" function. By sending a specially crafted packet to the server interface (default TCP/910), a remote attacker could overflow a buffer and execute arbitrary code on a vulnerable system.
DATAC Control International RealWin SCADA Server 2.0
System Compromise: Remote attackers can gain control of vulnerable systems.
Upgrade to the latest version, available from the following web site: http://www.realflex.com/products/realwin/realwin.php