First published: Fri Apr 04 2014(Updated: )
Multiple buffer overflows in the OPC Automation 2.0 Server Object ActiveX control in Schneider Electric OPC Factory Server (OFS) TLXCDSUOFS33 3.5 and earlier, TLXCDSTOFS33 3.5 and earlier, TLXCDLUOFS33 3.5 and earlier, TLXCDLTOFS33 3.5 and earlier, and TLXCDLFOFS33 3.5 and earlier allow remote attackers to cause a denial of service via long arguments to unspecified functions.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
OPC Factory Server | <=3.35 | |
schneider-electric OPC Factory Server | <=3.35 | |
schneider-electric OPC Factory Server | <=3.35 | |
schneider-electric OPC Factory Server | <=3.35 | |
schneider-electric OPC Factory Server | <=3.35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0789 has a high severity rating due to the existence of multiple buffer overflows that can allow remote code execution.
To fix CVE-2014-0789, you should update your Schneider Electric OPC Factory Server to a version later than 3.5.
CVE-2014-0789 affects multiple versions of Schneider Electric OPC Factory Server, specifically versions 3.5 and earlier.
Yes, CVE-2014-0789 can be exploited remotely by attacking systems running the affected versions of OPC Factory Server.
If exploited, CVE-2014-0789 could allow an attacker to execute arbitrary code on the affected systems.