説明
Gesytec Easylon OPC Server before 2.3.44 does not properly validate server handles, which allows remote attackers to execute arbitrary code or cause a denial of service via unspecified network traffic to the OLE for Process Control (OPC) interface, probably related to free operations on arbitrary memory addresses through certain Remove functions, and read and write operations on arbitrary memory addresses through certain Set, Read, and Write functions.
AI分析AIによる分析
影響を受ける製品
gesytec_easylonopc_server
2.30.32
参照
- http://osvdb.org/42650
- http://secunia.com/advisories/28079
- http://www.kb.cert.org/vuls/id/205073PatchUS Government Resource
- http://www.neutralbit.com/downloads/NB-NB-001-EXT-OPC%20Security%20Testing.pdf
- http://www.neutralbit.com/en/rd/opctest/
- http://www.securityfocus.com/bid/26876
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39062
- http://osvdb.org/42650
- http://secunia.com/advisories/28079
- http://www.kb.cert.org/vuls/id/205073PatchUS Government Resource
- http://www.neutralbit.com/downloads/NB-NB-001-EXT-OPC%20Security%20Testing.pdf
- http://www.neutralbit.com/en/rd/opctest/
- http://www.securityfocus.com/bid/26876
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39062