CVE-2015-1007

A specially crafted configuration file could be used to cause a stack-based buffer overflow condition in the OPCTest.exe, which may allow remote code execution on Opto 22 PAC Project Professional versions prior to R9.4008, PAC Project Basic versions prior to R9.4008, PAC Display Basic versions prior to R9.4g, PAC Display Professional versions prior to R9.4g, OptoOPCServer version R9.4c and prior that were installed by PAC Project installer, versions prior to R9.4008, and OptoDataLink version R9.4d and prior that were installed by PAC Project installer, versions prior to R9.4008. Opto 22 suggests upgrading to the new product version as soon as possible.
References
Link Resource
https://ics-cert.us-cert.gov/advisories/ICSA-15-120-01 Third Party Advisory US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-15-120-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:opto22:optodatalink:*:*:*:*:*:*:*:*
cpe:2.3:a:opto22:optoopcserver:*:*:*:*:*:*:*:*
cpe:2.3:a:opto22:pac_display:*:*:*:*:basic:*:*:*
cpe:2.3:a:opto22:pac_display:*:*:*:*:professional:*:*:*
cpe:2.3:a:opto22:pac_project:*:*:*:*:basic:*:*:*
cpe:2.3:a:opto22:pac_project:*:*:*:*:professional:*:*:*

History

21 Nov 2024, 02:24

Type Values Removed Values Added
References () https://ics-cert.us-cert.gov/advisories/ICSA-15-120-01 - US Government Resource, Third Party Advisory () https://ics-cert.us-cert.gov/advisories/ICSA-15-120-01 - Third Party Advisory, US Government Resource

Information

Published : 2019-03-25 19:29

Updated : 2024-11-21 02:24


NVD link : CVE-2015-1007

Mitre link : CVE-2015-1007

CVE.ORG link : CVE-2015-1007


JSON object : View

Products Affected

opto22

  • pac_display
  • optoopcserver
  • optodatalink
  • pac_project
CWE
CWE-121

Stack-based Buffer Overflow

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer