Stack-based buffer overflow in WTclient.dll in SCADA Engine BACnet OPC Client before 1.0.25 allows user-assisted remote attackers to execute arbitrary code via a crafted .csv file, related to a status log message.
References
Link | Resource |
---|---|
http://packetstormsecurity.org/1009-exploits/bacnet-overflow.py.txt | Exploit |
http://secunia.com/advisories/41466 | Vendor Advisory |
http://securityreason.com/securityalert/8083 | |
http://www.kb.cert.org/vuls/id/660688 | US Government Resource |
http://www.securityfocus.com/bid/43289 | Exploit |
http://www.us-cert.gov/control_systems/pdf/ICSA-10-264-01.pdf | US Government Resource |
Configurations
History
No history.
Information
Published : 2011-02-16 03:00
Updated : 2024-02-04 17:54
NVD link : CVE-2010-4740
Mitre link : CVE-2010-4740
CVE.ORG link : CVE-2010-4740
JSON object : View
Products Affected
scadaengine
- bacnet_opc_client
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer