Modbus/TCP Master OPC Server MODBUS Protocol Response Packet Remote Overflow

This script is Copyright (C) 2011-2012 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a SCADA application with a buffer
overflow vulnerability.

Description :

The version of the Modbus/TCP Master OPC Server from Automated
Solutions installed on the remote host is earlier than 3.0.2 and, as
such, reportedly has a buffer overflow vulnerability.

If the server can be made to initiate communications with a malicious
channel under an attacker's control, this issue can be leveraged to
overwrite data in a heap buffer resulting in an application crash and
possibly execution of arbitrary code.

See also :

http://automatedsolutions.com/pub/asmbtcpopc/readme.htm

Solution :

Upgrade to Automated Solutions' Modbus/TCP OPC Server 3.0.2 or
later.

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 53573 ()

Bugtraq ID: 45974

CVE ID: CVE-2010-4709