Multiple stack-based buffer overflows in ModbusDrv.exe in Schneider Electric Modbus Serial Driver 1.10 through 3.2 allow remote attackers to execute arbitrary code via a large buffer-size value in a Modbus Application Header.
References
Link | Resource |
---|---|
http://ics-cert.us-cert.gov/advisories/ICSA-14-086-01 | Mitigation Third Party Advisory US Government Resource |
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202013-070-01 | Vendor Advisory |
http://www.securityfocus.com/bid/66500 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/45220/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/45219/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-03-31 23:17
Updated : 2022-02-03 05:57
NVD link : CVE-2013-0662
Mitre link : CVE-2013-0662
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
schneider-electric
- somove
- sft2841
- unity_pro
- unityloader
- modbuscommdtm_sl
- concept
- twidosuite
- pl7
- somachine
- modbus_serial_driver
- powersuite
- opc_factory_server
schneider_electric
- somachine