Vulnerability Note VU#127584
RSLinx Classic EDS Wizard buffer overflow vulnerability
Rockwell Automation RSLinx Classic EDS Hardware Installation Tool contains a buffer overflow vulnerability.
According to Rockwell Automation's website: RSLinx Classic provides plant-floor device connectivity for a wide variety of Rockwell Software applications such as RSLogix™ 5/500/5000 and RSView32. The EDS Hardware Installation Tool (RSHWare.exe) that comes bundled with RSLinx Classic contains a buffer overflow vulnerability while parsing improperly formatted EDS files.
An attacker could exploit the vulnerability by tricking a user into opening a crafted .eds file, causing EDS Hardware Installation Tool to crash leading to possible execution of arbitrary code.
Apply an Update
According to Rockwell Automation's security advisory:
Vendor Information (Learn More)
This vulnerability is present in version 188.8.131.52 and earlier versions of the EDS Hardware Installation Tool (RSHWare.exe).
|Vendor||Status||Date Notified||Date Updated|
|Rockwell Automation||Affected||25 Apr 2011||01 Jun 2011|
CVSS Metrics (Learn More)
This vulnerability was found by Rockwell Automation's internal team and additionally by Michael Orlando working for CERT/CC.
This document was written by Michael Orlando.
- CVE IDs: CVE-2011-2530
- Date Public: 31 May 2011
- Date First Published: 02 Jun 2011
- Date Last Updated: 18 Aug 2011
- Severity Metric: 0.03
- Document Revision: 31
If you have feedback, comments, or additional information about this vulnerability, please send us email.