1 results (0.008 seconds)

CVSS: 6.9EPSS: 19%CPEs: 6EXPL: 0

Stack-based buffer overflow in the C++ sample client in Schneider Electric OPC Factory Server (OFS) TLXCDSUOFS33 - 3.35, TLXCDSTOFS33 - 3.35, TLXCDLUOFS33 - 3.35, TLXCDLTOFS33 - 3.35, and TLXCDLFOFS33 - 3.35 allows local users to gain privileges via vectors involving a malformed configuration file. Desbordamiento de buffer basado en pila en el cliente C++ de ejemplo en Schneider Electric OPC Factory Server (OFS) TLXCDSUOFS33 - 3.35, TLXCDSTOFS33 - 3.35, TLXCDLUOFS33 - 3.35, TLXCDLTOFS33 - 3.35 y TLXCDLFOFS33 - 3.35 permite a usuarios locales ganar privilegios a través de vectores involucrando un archivo de configuración malformado. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Schneider Electric OFS Client. User interaction is required to exploit this vulnerability in that the target must load a malicious file. The specific flaw exists within the parsing of the configuration file. A crafted configuration file will result in an exploitable stack buffer overflow. • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-031-01 http://ics-cert.us-cert.gov/advisories/ICSA-14-058-02 http://www.securityfocus.com/bid/65871 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •