CVE-2010-4740

Stack-based buffer overflow in WTclient.dll in SCADA Engine BACnet OPC Client before 1.0.25 allows user-assisted remote attackers to execute arbitrary code via a crafted .csv file, related to a status log message.
Configurations

Configuration 1 (hide)

cpe:2.3:a:scadaengine:bacnet_opc_client:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:21

Type Values Removed Values Added
References () http://packetstormsecurity.org/1009-exploits/bacnet-overflow.py.txt - Exploit () http://packetstormsecurity.org/1009-exploits/bacnet-overflow.py.txt - Exploit
References () http://secunia.com/advisories/41466 - Vendor Advisory () http://secunia.com/advisories/41466 - Vendor Advisory
References () http://securityreason.com/securityalert/8083 - () http://securityreason.com/securityalert/8083 -
References () http://www.kb.cert.org/vuls/id/660688 - US Government Resource () http://www.kb.cert.org/vuls/id/660688 - US Government Resource
References () http://www.securityfocus.com/bid/43289 - Exploit () http://www.securityfocus.com/bid/43289 - Exploit
References () http://www.us-cert.gov/control_systems/pdf/ICSA-10-264-01.pdf - US Government Resource () http://www.us-cert.gov/control_systems/pdf/ICSA-10-264-01.pdf - US Government Resource

Information

Published : 2011-02-16 03:00

Updated : 2024-11-21 01:21


NVD link : CVE-2010-4740

Mitre link : CVE-2010-4740

CVE.ORG link : CVE-2010-4740


JSON object : View

Products Affected

scadaengine

  • bacnet_opc_client
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer