First published: Tue Feb 21 2012(Updated: )
Buffer overflow in the Advantech ADAM OLE for Process Control (OPC) Server ActiveX control in ADAM OPC Server before 3.01.012, Modbus RTU OPC Server before 3.01.010, and Modbus TCP OPC Server before 3.01.010 allows remote attackers to execute arbitrary code via unspecified vectors.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech Adam Opc Server | <=3.01.011 | |
Advantech Modbus Rtu Opc Server | <=3.01.010 | |
Advantech Modbus Tcp Opc Server | <=3.01.09 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1914 has a medium severity rating due to the potential for remote code execution.
To mitigate CVE-2011-1914, upgrade to Advantech ADAM OPC Server version 3.01.012 or higher, Modbus RTU OPC Server version 3.01.011 or higher, and Modbus TCP OPC Server version 3.01.010 or higher.
CVE-2011-1914 affects Advantech ADAM OPC Server versions before 3.01.012 and Modbus OPC Servers before their respective updated versions.
CVE-2011-1914 is classified as a buffer overflow vulnerability.
Yes, CVE-2011-1914 can be exploited remotely by attackers to execute arbitrary code.