ID

VAR-201002-0325


TITLE

RSLinx EDS File Remote Stack Buffer Overflow Vulnerability

Trust: 0.3

sources: BID: 38171

DESCRIPTION

RSLinx is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Successful exploits may allow remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts will likely cause denial-of-service conditions. RSLinx Lite 2.31.00 is vulnerable; other versions may also be affected.

Trust: 0.3

sources: BID: 38171

AFFECTED PRODUCTS

vendor:rockwallmodel:automation rslinxscope:eqversion:2.31

Trust: 0.3

sources: BID: 38171

THREAT TYPE

network

Trust: 0.3

sources: BID: 38171

TYPE

Boundary Condition Error

Trust: 0.3

sources: BID: 38171

EXTERNAL IDS

db:BIDid:38171

Trust: 0.3

sources: BID: 38171

REFERENCES

url:http://jbrownsec.blogspot.com/2010/02/reverse-engineering-file-formats.html

Trust: 0.3

url:http://www.rockwellautomation.com/rockwellsoftware/design/rslinx/

Trust: 0.3

sources: BID: 38171

CREDITS

Jeremy Brown

Trust: 0.3

sources: BID: 38171

SOURCES

db:BIDid:38171

LAST UPDATE DATE

2022-05-17T01:56:41.900000+00:00


SOURCES UPDATE DATE

db:BIDid:38171date:2010-02-10T00:00:00

SOURCES RELEASE DATE

db:BIDid:38171date:2010-02-10T00:00:00