First published: Fri Mar 14 2014(Updated: )
Heap-based buffer overflow in BKCLogSvr.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via crafted UDP packets.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa CENTUM CS 3000 | <=r3.09.50 | |
Yokogawa CENTUM CS 3000 | =r3.01 | |
Yokogawa CENTUM CS 3000 | =r3.02 | |
Yokogawa CENTUM CS 3000 | =r3.03 | |
Yokogawa CENTUM CS 3000 | =r3.04 | |
Yokogawa CENTUM CS 3000 | =r3.05 | |
Yokogawa CENTUM CS 3000 | =r3.06 | |
Yokogawa CENTUM CS 3000 | =r3.07 | |
Yokogawa CENTUM CS 3000 | =r3.08 | |
Yokogawa CENTUM CS 3000 | =r3.08.50 | |
Yokogawa CENTUM CS 3000 | =r3.08.70 | |
Yokogawa CENTUM CS 3000 | =r3.09 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0781 is rated as a high-severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2014-0781, it is recommended to upgrade to a newer version of Yokogawa CENTUM CS 3000 beyond R3.09.50.
CVE-2014-0781 is classified as a heap-based buffer overflow vulnerability.
CVE-2014-0781 affects users of Yokogawa CENTUM CS 3000 R3.09.50 and earlier versions.
If exploited, CVE-2014-0781 could allow remote attackers to execute arbitrary code on the affected system.