First published: Mon Feb 16 2015(Updated: )
Multiple stack-based buffer overflows in Motorola Scanner SDK allow remote attackers to execute arbitrary code via a crafted string to the Open method in (1) IOPOSScanner.ocx or (2) IOPOSScale.ocx.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Motorola Scanner SDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1495 is classified as a critical vulnerability due to the potential for remote code execution.
To mitigate CVE-2015-1495, update the Motorola Scanner SDK to the latest version that resolves the buffer overflow vulnerabilities.
CVE-2015-1495 affects the IOPOSScanner.ocx and IOPOSScale.ocx components of the Motorola Scanner SDK.
Yes, CVE-2015-1495 can be exploited by remote attackers through crafted strings sent to the vulnerable components.
Exploitation of CVE-2015-1495 could allow attackers to execute arbitrary code on the victim's system.