Rockwell Automation RSLinx Classic < 3.73.00 Buffer Overflow

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.

Synopsis :

An application running on the remote host is affected by an arbitrary
code execution vulnerability.

Description :

The remote host has a version of RSLinx Classic installed that is
prior to 3.73.00. It is, therefore, affected by an arbitrary code
execution vulnerability due an overflow condition caused by improper
validation of user-supplied input. A local attacker can exploit this,
via a specially crafted comma-separated value (CSV) file, to cause a
stack-based buffer overflow, resulting in a denial of service
condition or the execution of arbitrary code.

See also :

Solution :

Upgrade to Rockwell Automation RSLinx Classic version 3.73.00 or

Risk factor :

High / CVSS Base Score : 9.3

Family: SCADA

Nessus Plugin ID: 83523 ()

Bugtraq ID: 74553

CVE ID: CVE-2014-9204

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now