Modbus/TCP Master OPC Server MODBUS Protocol Response Packet Remote Overflow

high Nessus Plugin ID 53573

Synopsis

The remote Windows host contains a SCADA application with a buffer overflow vulnerability.

Description

The version of the Modbus/TCP Master OPC Server from Automated Solutions installed on the remote host is earlier than 3.0.2 and, as such, reportedly has a buffer overflow vulnerability.

If the server can be made to initiate communications with a malicious channel under an attacker's control, this issue can be leveraged to overwrite data in a heap buffer resulting in an application crash and possibly execution of arbitrary code.

Solution

Upgrade to Automated Solutions' Modbus/TCP OPC Server 3.0.2 or later.

See Also

https://automatedsolutions.com/pub/asmbtcpopc/readme.htm

Plugin Details

Severity: High

ID: 53573

File Name: scada_asmbtcpopc_3_0_2.nbin

Version: 1.66

Type: local

Family: SCADA

Published: 4/27/2011

Updated: 5/20/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SCADA/Apps/AutomatedSolutions/ModbusTCPOPC/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/30/2010

Vulnerability Publication Date: 1/25/2011

Reference Information

CVE: CVE-2010-4709

BID: 45974

ICS-ALERT: 10-322-02A