This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.
An application running on the remote host is affected by an arbitrary
code execution vulnerability.
The remote host has a version of RSLinx Classic installed that is
prior to 3.73.00. It is, therefore, affected by an arbitrary code
execution vulnerability due an overflow condition caused by improper
validation of user-supplied input. A local attacker can exploit this,
via a specially crafted comma-separated value (CSV) file, to cause a
stack-based buffer overflow, resulting in a denial of service
condition or the execution of arbitrary code.
See also :
Upgrade to Rockwell Automation RSLinx Classic version 3.73.00 or
Risk factor :
High / CVSS Base Score : 9.3