Modbus/TCP Master OPC Server MODBUS Protocol Response Packet Remote Overflow

High Nessus Plugin ID 53573


The remote Windows host contains a SCADA application with a buffer overflow vulnerability.


The version of the Modbus/TCP Master OPC Server from Automated Solutions installed on the remote host is earlier than 3.0.2 and, as such, reportedly has a buffer overflow vulnerability.

If the server can be made to initiate communications with a malicious channel under an attacker's control, this issue can be leveraged to overwrite data in a heap buffer resulting in an application crash and possibly execution of arbitrary code.


Upgrade to Automated Solutions' Modbus/TCP OPC Server 3.0.2 or later.

See Also

Plugin Details

Severity: High

ID: 53573

File Name: scada_asmbtcpopc_3_0_2.nbin

Version: $Revision: 1.19 $

Type: local

Family: SCADA

Published: 2011/04/27

Modified: 2018/01/29

Dependencies: 53572

Risk Information

Risk Factor: High


Base Score: 7.6

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Required KB Items: SCADA/Apps/AutomatedSolutions/ModbusTCPOPC/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/10/30

Vulnerability Publication Date: 2011/01/25

Reference Information

CVE: CVE-2010-4709

BID: 45974

OSVDB: 70637

EDB-ID: 16040

ICS-ALERT: 10-322-02A