ID

VAR-201106-0302


TITLE

RSLinx OPC Automation ActiveX Control Stack Buffer Overflow Vulnerability

Trust: 1.1

sources: IVD: f915a4be-1f90-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-2493 // BID: 48492

DESCRIPTION

Rockwell Automation RSLinx is a communication management software provided by Rockwell for users. When creating a debug string, the OPC Automation ActiveX control (\"RsiOPCAuto.OPCServer\") has a boundary error, and submitting a long string to the \"ProgID\" parameter of the \"Connect()\" method triggers a stack-based buffer overflow. Successful exploitation of a vulnerability can execute arbitrary code in the context of an application. The RSLinx ActiveX control is prone to a remote stack-based buffer-overflow vulnerability that affects the 'RsiOPCAuto.OPCServer' ActiveX control. Failed exploit attempts will result in a denial-of-service condition. The following products are vulnerable: Rockwell OPC Automation ActiveX Control version 1.1.8.0 RSLinx 2.3.1 Build 10

Trust: 0.99

sources: CNVD: CNVD-2011-2493 // BID: 48492 // IVD: f915a4be-1f90-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: f915a4be-1f90-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-2493

AFFECTED PRODUCTS

vendor:rockwellmodel:automation rockwell opc automationscope:eqversion:1.1.8.0

Trust: 0.9

vendor:rockwellmodel:automation rslinx buildscope:eqversion:2.3.110

Trust: 0.8

vendor:rockwallmodel:automation rslinx buildscope:eqversion:2.3.110

Trust: 0.3

vendor:rockwellmodel:automation rslinxscope:neversion:2.55

Trust: 0.3

vendor:rockwellmodel:automationscope:eqversion:*

Trust: 0.2

vendor:rockwellmodel:opc automationscope:eqversion:1.1.8.0*

Trust: 0.2

sources: IVD: f915a4be-1f90-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-2493 // BID: 48492

CVSS

SEVERITY

CVSSV2

CVSSV3

IVD: f915a4be-1f90-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

IVD: f915a4be-1f90-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.0
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0 [IVD]

Trust: 0.2

sources: IVD: f915a4be-1f90-11e6-abef-000c29c66e3d

THREAT TYPE

network

Trust: 0.3

sources: BID: 48492

TYPE

Boundary Condition Error

Trust: 0.3

sources: BID: 48492

PATCH

title:RSLinx OPC Automation ActiveX Control Stack Buffer Overflow Vulnerability Patchurl:https://www.cnvd.org.cn/patchinfo/show/4291

Trust: 0.6

sources: CNVD: CNVD-2011-2493

EXTERNAL IDS

db:BIDid:48492

Trust: 0.9

db:CNVDid:CNVD-2011-2493

Trust: 0.8

db:IVDid:F915A4BE-1F90-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: f915a4be-1f90-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-2493 // BID: 48492

REFERENCES

url:http://secunia.com/secunia_research/2011-50/

Trust: 0.9

url:http://www.rockwellautomation.com/rockwellsoftware/design/rslinx/

Trust: 0.3

sources: CNVD: CNVD-2011-2493 // BID: 48492

CREDITS

Dmitriy Pletnev of Secunia Research

Trust: 0.3

sources: BID: 48492

SOURCES

db:IVDid:f915a4be-1f90-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2011-2493
db:BIDid:48492

LAST UPDATE DATE

2022-05-17T01:43:34.001000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-2493date:2011-06-30T00:00:00
db:BIDid:48492date:2011-06-29T00:00:00

SOURCES RELEASE DATE

db:IVDid:f915a4be-1f90-11e6-abef-000c29c66e3ddate:2011-06-30T00:00:00
db:CNVDid:CNVD-2011-2493date:2011-06-30T00:00:00
db:BIDid:48492date:2011-06-29T00:00:00