search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Automated Solutions Modbus/TCP Master OPC server Modbus TCP header vulnerability

Vulnerability Note VU#768840

Original Release Date: 2011-02-03 | Last Revised: 2011-02-03

Overview

Automated Solutions OPC Server contains a heap corruption vulnerability in the Modbus/TCP Master OPC server.

Description

Automated Solutions Modbus/TCP Master OPC Server contains a heap corruption vulnerability. The server is vulnerable to an attacker writing an arbitrary number of double words or DWORDs onto the heap.

For additional information see ICSA-10-322-02A.

Exploit code for this vulnerability is publicly available.

Impact

Successful exploitation would likely not allow arbitrary code execution; however, an exploit could possibly corrupt the OPC server memory and cause a denial of service.

Solution

Upgrade

According to the Modbus/TCP OPC Server readme file, version 3.0.2 addresses this vulnerability.

Restrict Access

Enable firewall rules to restrict access to only trusted sources.

Vendor Information

768840
Expand all

Automated Solutions

Updated:  January 26, 2011

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

http://automatedsolutions.com/demos/demoform.asp?code=17 http://automatedsolutions.com/pub/asmbtcpopc/readme.htm

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

Thanks to Jeremy Brown for reporting this vulnerability to ICS-CERT.

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2010-4709
Severity Metric: 1.02
Date Public: 2010-11-22
Date First Published: 2011-02-03
Date Last Updated: 2011-02-03 15:09 UTC
Document Revision: 22

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.