Modbus/TCP Master OPC Server MODBUS Protocol Response Packet Remote Overflow

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a SCADA application with a buffer
overflow vulnerability.

Description :

The version of the Modbus/TCP Master OPC Server from Automated
Solutions installed on the remote host is earlier than 3.0.2 and, as
such, reportedly has a buffer overflow vulnerability.

If the server can be made to initiate communications with a malicious
channel under an attacker's control, this issue can be leveraged to
overwrite data in a heap buffer resulting in an application crash and
possibly execution of arbitrary code.

See also :

http://automatedsolutions.com/pub/asmbtcpopc/readme.htm

Solution :

Upgrade to Automated Solutions' Modbus/TCP OPC Server 3.0.2 or
later.

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 53573 ()

Bugtraq ID: 45974

CVE ID: CVE-2010-4709

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial