Vulnerability Note VU#768840

Automated Solutions Modbus/TCP Master OPC server Modbus TCP header vulnerability

Original Release date: 03 Feb 2011 | Last revised: 03 Feb 2011

Overview

Automated Solutions OPC Server contains a heap corruption vulnerability in the Modbus/TCP Master OPC server.

Description

Automated Solutions Modbus/TCP Master OPC Server contains a heap corruption vulnerability. The server is vulnerable to an attacker writing an arbitrary number of double words or DWORDs onto the heap.

For additional information see ICSA-10-322-02A.

Exploit code for this vulnerability is publicly available.

Impact

Successful exploitation would likely not allow arbitrary code execution; however, an exploit could possibly corrupt the OPC server memory and cause a denial of service.

Solution

Upgrade

According to the Modbus/TCP OPC Server readme file, version 3.0.2 addresses this vulnerability.

Restrict Access

Enable firewall rules to restrict access to only trusted sources.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Automated SolutionsAffected-26 Jan 2011
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to Jeremy Brown for reporting this vulnerability to ICS-CERT.

This document was written by Michael Orlando.

Other Information

  • CVE IDs: CVE-2010-4709
  • Date Public: 22 Nov 2010
  • Date First Published: 03 Feb 2011
  • Date Last Updated: 03 Feb 2011
  • Severity Metric: 1.02
  • Document Revision: 22

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.