Stack-based buffer overflow in WTclient.dll in SCADA Engine BACnet OPC Client before 1.0.25 allows user-assisted remote attackers to execute arbitrary code via a crafted .csv file, related to a status log message.
References
Link | Resource |
---|---|
http://packetstormsecurity.org/1009-exploits/bacnet-overflow.py.txt | Exploit |
http://secunia.com/advisories/41466 | Vendor Advisory |
http://securityreason.com/securityalert/8083 | |
http://www.kb.cert.org/vuls/id/660688 | US Government Resource |
http://www.securityfocus.com/bid/43289 | Exploit |
http://www.us-cert.gov/control_systems/pdf/ICSA-10-264-01.pdf | US Government Resource |
http://packetstormsecurity.org/1009-exploits/bacnet-overflow.py.txt | Exploit |
http://secunia.com/advisories/41466 | Vendor Advisory |
http://securityreason.com/securityalert/8083 | |
http://www.kb.cert.org/vuls/id/660688 | US Government Resource |
http://www.securityfocus.com/bid/43289 | Exploit |
http://www.us-cert.gov/control_systems/pdf/ICSA-10-264-01.pdf | US Government Resource |
Configurations
History
21 Nov 2024, 01:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.org/1009-exploits/bacnet-overflow.py.txt - Exploit | |
References | () http://secunia.com/advisories/41466 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/8083 - | |
References | () http://www.kb.cert.org/vuls/id/660688 - US Government Resource | |
References | () http://www.securityfocus.com/bid/43289 - Exploit | |
References | () http://www.us-cert.gov/control_systems/pdf/ICSA-10-264-01.pdf - US Government Resource |
Information
Published : 2011-02-16 03:00
Updated : 2024-11-21 01:21
NVD link : CVE-2010-4740
Mitre link : CVE-2010-4740
CVE.ORG link : CVE-2010-4740
JSON object : View
Products Affected
scadaengine
- bacnet_opc_client
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer