First published: Fri Feb 28 2014(Updated: )
Stack-based buffer overflow in the C++ sample client in Schneider Electric OPC Factory Server (OFS) TLXCDSUOFS33 - 3.35, TLXCDSTOFS33 - 3.35, TLXCDLUOFS33 - 3.35, TLXCDLTOFS33 - 3.35, and TLXCDLFOFS33 - 3.35 allows local users to gain privileges via vectors involving a malformed configuration file.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
schneider-electric OFS test client TLXCDLFOFS33 | =3.35 | |
schneider-electric OFS test client TLXCDLTOFS33 | =3.35 | |
OFS Test Client TLXCDLUOFS33 | =3.35 | |
schneider-electric OFS test client TLXCDSTOFS33 | =3.35 | |
schneider-electric OFS test client TLXCDSUOFS33 | =3.35 | |
OPC Factory Server | =3.35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0774 has been classified with a high severity rating due to its potential for local privilege escalation.
To fix CVE-2014-0774, apply the appropriate patches provided by Schneider Electric for the affected versions of OPC Factory Server and OFS test clients.
CVE-2014-0774 affects local users of the Schneider Electric OPC Factory Server and specific OFS test clients version 3.35.
CVE-2014-0774 is a stack-based buffer overflow vulnerability.
CVE-2014-0774 cannot be exploited remotely; it requires local access to the system for exploitation.