Integer overflow in the GatewayService component in 3S CoDeSys 3.4 SP4 Patch 2 allows remote attackers to execute arbitrary code via a large size value in the packet header, which triggers a heap-based buffer overflow.
References
Configurations
History
21 Nov 2024, 01:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.altervista.org/adv/codesys_1-adv.txt - | |
References | () http://seclists.org/bugtraq/2011/Nov/178 - | |
References | () http://secunia.com/advisories/47018 - Vendor Advisory | |
References | () http://www.osvdb.org/77386 - | |
References | () http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-336-01A.pdf - Exploit, US Government Resource | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/71531 - |
Information
Published : 2011-12-25 01:55
Updated : 2024-11-21 01:33
NVD link : CVE-2011-5008
Mitre link : CVE-2011-5008
CVE.ORG link : CVE-2011-5008
JSON object : View
Products Affected
3ssoftware
- codesys
CWE
CWE-189
Numeric Errors