描述
Gesytec Easylon OPC Server before 2.3.44 does not properly validate server handles, which allows remote attackers to execute arbitrary code or cause a denial of service via unspecified network traffic to the OLE for Process Control (OPC) interface, probably related to free operations on arbitrary memory addresses through certain Remove functions, and read and write operations on arbitrary memory addresses through certain Set, Read, and Write functions.
AI分析AI驱动
受影响产品
gesytec_easylonopc_server
2.30.32
参考资料
- http://osvdb.org/42650
- http://secunia.com/advisories/28079
- http://www.kb.cert.org/vuls/id/205073PatchUS Government Resource
- http://www.neutralbit.com/downloads/NB-NB-001-EXT-OPC%20Security%20Testing.pdf
- http://www.neutralbit.com/en/rd/opctest/
- http://www.securityfocus.com/bid/26876
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39062
- http://osvdb.org/42650
- http://secunia.com/advisories/28079
- http://www.kb.cert.org/vuls/id/205073PatchUS Government Resource
- http://www.neutralbit.com/downloads/NB-NB-001-EXT-OPC%20Security%20Testing.pdf
- http://www.neutralbit.com/en/rd/opctest/
- http://www.securityfocus.com/bid/26876
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39062