Rockwell Automation RSLinx Classic < 3.73.00 Buffer Overflow

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

An application running on the remote host is affected by an arbitrary
code execution vulnerability.

Description :

The remote host has a version of RSLinx Classic installed that is
prior to 3.73.00. It is, therefore, affected by an arbitrary code
execution vulnerability due an overflow condition caused by improper
validation of user-supplied input. A local attacker can exploit this,
via a specially crafted comma-separated value (CSV) file, to cause a
stack-based buffer overflow, resulting in a denial of service
condition or the execution of arbitrary code.

See also :

http://www.nessus.org/u?2e91b58a
https://ics-cert.us-cert.gov/advisories/ICSA-15-111-02

Solution :

Upgrade to Rockwell Automation RSLinx Classic version 3.73.00 or
later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: SCADA

Nessus Plugin ID: 83523 ()

Bugtraq ID: 74553

CVE ID: CVE-2014-9204

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now