Stack-based buffer overflow in WTclient.dll in SCADA Engine BACnet OPC Client before 1.0.25 allows user-assisted remote attackers to execute arbitrary code via a crafted .csv file, related to a status log message.
References
Link | Resource |
---|---|
http://secunia.com/advisories/41466 | Vendor Advisory |
http://packetstormsecurity.org/1009-exploits/bacnet-overflow.py.txt | Exploit |
http://www.securityfocus.com/bid/43289 | Exploit |
http://www.us-cert.gov/control_systems/pdf/ICSA-10-264-01.pdf | US Government Resource |
http://www.kb.cert.org/vuls/id/660688 | US Government Resource |
http://securityreason.com/securityalert/8083 |
Configurations
Information
Published : 2011-02-15 19:00
Updated : 2011-09-21 20:27
NVD link : CVE-2010-4740
Mitre link : CVE-2010-4740
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
scadaengine
- bacnet_opc_client