First published: Thu Dec 11 2014(Updated: )
Integer overflow in Trihedral Engineering VTScada (formerly VTS) 6.5 through 9.x before 9.1.20, 10.x before 10.2.22, and 11.x before 11.1.07 allows remote attackers to cause a denial of service (server crash) via a crafted request, which triggers a large memory allocation.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Trihedral VTScada | >=6.5<9.1.20 | |
Trihedral VTScada | >=10.0<10.2.22 | |
Trihedral VTScada | >=11.0<11.1.07 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9192 is categorized as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2014-9192, upgrade VTScada to version 9.1.20 or later, 10.2.22 or later, or 11.1.07 or later.
CVE-2014-9192 can lead to server crashes, disrupting service and impacting system availability.
Organizations using Trihedral Engineering VTScada versions prior to the patched releases are at risk from CVE-2014-9192.
Yes, CVE-2014-9192 can be exploited by remote attackers through specially crafted requests.