Lucene search

K
cve[email protected]CVE-2010-4709
HistoryJan 28, 2011 - 4:00 p.m.

CVE-2010-4709

2011-01-2816:00:02
CWE-119
web.nvd.nist.gov
25
cve-2010-4709
automated solutions
modbus
tcp
master opc server
buffer overflow
denial of service
crash
execute arbitrary code
nvd

7.6 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

8.3 High

AI Score

Confidence

High

0.702 High

EPSS

Percentile

98.0%

Heap-based buffer overflow in Automated Solutions Modbus/TCP Master OPC Server before 3.0.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a MODBUS response packet with a crafted length field.

Affected configurations

NVD
Node
automatedsolutionsmodbus\/tcp_master_opc_serverRange3.0.1
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.0
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.0_build_1
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.0a
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.1
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.2
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.2a
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.3
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.3a
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.4
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.4a
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.5
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.6
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.6a
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.6b
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.7
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.7a
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.7b
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.7c
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.7d
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.7e
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.7f
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.8
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.9
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.9.1
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.9.4
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.9.5
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.9_build_2.9.3
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.10
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.11
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.12
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.12.1
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch2.12.3
OR
automatedsolutionsmodbus\/tcp_master_opc_serverMatch3.0.0

7.6 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

8.3 High

AI Score

Confidence

High

0.702 High

EPSS

Percentile

98.0%

Related for CVE-2010-4709