search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Automated Solutions Modbus/TCP Master OPC server Modbus TCP header vulnerability

Vulnerability Note VU#768840

Original Release Date: 2011-02-03 | Last Revised: 2011-02-03

Overview

Automated Solutions OPC Server contains a heap corruption vulnerability in the Modbus/TCP Master OPC server.

Description

Automated Solutions Modbus/TCP Master OPC Server contains a heap corruption vulnerability. The server is vulnerable to an attacker writing an arbitrary number of double words or DWORDs onto the heap.

For additional information see ICSA-10-322-02A.

Exploit code for this vulnerability is publicly available.

Impact

Successful exploitation would likely not allow arbitrary code execution; however, an exploit could possibly corrupt the OPC server memory and cause a denial of service.

Solution

Upgrade

According to the Modbus/TCP OPC Server readme file, version 3.0.2 addresses this vulnerability.

Restrict Access

Enable firewall rules to restrict access to only trusted sources.

Vendor Information

768840
 

Automated Solutions Affected

Updated:  January 26, 2011

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Jeremy Brown for reporting this vulnerability to ICS-CERT.

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2010-4709
Severity Metric: 1.02
Date Public: 2010-11-22
Date First Published: 2011-02-03
Date Last Updated: 2011-02-03 15:09 UTC
Document Revision: 22

Sponsored by CISA.