First published: Fri Mar 14 2014(Updated: )
Stack-based buffer overflow in BKHOdeq.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa CENTUM CS 3000 | <=r3.09.50 | |
Yokogawa CENTUM CS 3000 | =r3.01 | |
Yokogawa CENTUM CS 3000 | =r3.02 | |
Yokogawa CENTUM CS 3000 | =r3.03 | |
Yokogawa CENTUM CS 3000 | =r3.04 | |
Yokogawa CENTUM CS 3000 | =r3.05 | |
Yokogawa CENTUM CS 3000 | =r3.06 | |
Yokogawa CENTUM CS 3000 | =r3.07 | |
Yokogawa CENTUM CS 3000 | =r3.08 | |
Yokogawa CENTUM CS 3000 | =r3.08.50 | |
Yokogawa CENTUM CS 3000 | =r3.08.70 | |
Yokogawa CENTUM CS 3000 | =r3.09 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0783 is classified as a critical vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2014-0783, upgrade Yokogawa CENTUM CS 3000 to version R3.09.51 or later.
CVE-2014-0783 affects Yokogawa CENTUM CS 3000 versions R3.09.50 and earlier.
Yes, CVE-2014-0783 can be exploited remotely through crafted TCP packets.
CVE-2014-0783 is a stack-based buffer overflow vulnerability.