ID
VAR-201002-0325
TITLE
RSLinx EDS File Remote Stack Buffer Overflow Vulnerability
Trust: 0.3
sources:
BID: 38171
DESCRIPTION
RSLinx is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Successful exploits may allow remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts will likely cause denial-of-service conditions. RSLinx Lite 2.31.00 is vulnerable; other versions may also be affected.
Trust: 0.3
sources:
BID: 38171
AFFECTED PRODUCTS
vendor: | rockwall | model: | automation rslinx | scope: | eq | version: | 2.31 | Trust: 0.3 |
sources:
BID: 38171
THREAT TYPE
network
Trust: 0.3
sources:
BID: 38171
TYPE
Boundary Condition Error
Trust: 0.3
sources:
BID: 38171
EXTERNAL IDS
db: | BID | id: | 38171 | Trust: 0.3 |
sources:
BID: 38171
REFERENCES
url: | http://jbrownsec.blogspot.com/2010/02/reverse-engineering-file-formats.html | Trust: 0.3 |
url: | http://www.rockwellautomation.com/rockwellsoftware/design/rslinx/ | Trust: 0.3 |
sources:
BID: 38171
CREDITS
Jeremy Brown
Trust: 0.3
sources:
BID: 38171
SOURCES
db: | BID | id: | 38171 |
LAST UPDATE DATE
2022-05-17T01:56:41.900000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 38171 | date: | 2010-02-10T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 38171 | date: | 2010-02-10T00:00:00 |