Page 4 of 20 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

An unquoted search path or element in RSLinx Classic Versions 3.90.01 and prior and FactoryTalk Linx Gateway Versions 3.90.00 and prior may allow an authorized, but non-privileged local user to execute arbitrary code and allow a threat actor to escalate user privileges on the affected workstation. Un elemento o ruta de búsqueda sin entrecomillar en RSLinx Classic en versiones 3.90.01 y anteriores y FactoryTalk Linx Gateway en versiones 3.90.00 y anteriores podría permitir que un usuario local autorizado sin privilegios ejecute código arbitrario y permita que un actor de amenaza escale sus privilegios de usuario en la estación de trabajo afectada. Rockwell Automation RSLinx Classic and FactoryTalk Linx Gateway suffer from a privilege escalation vulnerability. Rockwell Automation RSLinx Classic versions 3.90.01, 3.73.00, 3.72.00, and 2.58.00 are susceptible. Rockwell Automation FactoryTalk Linx Gateway version 3.90.00 is susceptible. • https://www.exploit-db.com/exploits/44892 http://www.securityfocus.com/bid/104415 https://ics-cert.us-cert.gov/advisories/ICSA-18-158-01 • CWE-428: Unquoted Search Path or Element •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

Stack-based buffer overflow in OPCTest.exe in Rockwell Automation RSLinx Classic before 3.73.00 allows remote attackers to execute arbitrary code via a crafted CSV file. Desbordamiento de buffer basado en pila en OPCTest.exe en Rockwell Automation RSLinx Classic anterior a 3.73.00 permite a atacantes remotos ejecutar código arbitrario a través de un fichero CSV manipulado. • https://ics-cert.us-cert.gov/advisories/ICSA-15-111-02 https://rockwellautomation.custhelp.com/app/answers/detail/a_id/646324 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 3%CPEs: 8EXPL: 0

Buffer overflow in LogReceiver.exe in Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a UDP packet with a certain integer length value that is (1) too large or (2) too small, leading to improper handling by Logger.dll. Un desbordamiento de búfer en el archivo LogReceiver.exe en RSLinx Enterprise de Rockwell Automation versiones CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1 y CPR9-SR6, permite a los atacantes remotos causar una denegación de servicio (bloqueo del demonio) o posiblemente ejecutar código arbitrario por medio de un paquete UDP con un cierto valor de longitud de entero que es (1) demasiado grande o (2) demasiado pequeño, conllevando a un manejo inapropiado por parte de la biblioteca Logger.dll. • http://ics-cert.us-cert.gov/pdf/ICSA-13-095-02.pdf https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.1EPSS: 0%CPEs: 8EXPL: 0

LogReceiver.exe in Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (service outage) via a zero-byte UDP packet that is not properly handled by Logger.dll. LogReceiver.exe de Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, SR2-CPR9, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1 y CPR9-SR6 permite a atacantes remotos provocar una denegación de servicio (interrupción del servicio) a través de un paquete UDP de cero bytes que no se maneja adecuadamente por Logger.dll. • http://ics-cert.us-cert.gov/pdf/ICSA-13-095-02.pdf https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 1%CPEs: 2EXPL: 0

Buffer overflow in RSEds.dll in RSHWare.exe in the EDS Hardware Installation Tool 1.0.5.1 and earlier in Rockwell Automation RSLinx Classic before 2.58 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed .eds file. Desbordamiento de búfer en RSEds.dll en RSHWare.exe en EDS Hardware Installation Tool v1.0.5.1 y anteriores de Rockwell Automation RSLinx antes de v2.58, permite atecantes remotos asistidos por el usuario provocar una denegación de servicio (caída de aplicación) o posiblemente ejecutar código de su elección a través de un archivo .eds mal formado. • http://rockwellautomation.custhelp.com/app/answers/detail/a_id/279194 http://www.kb.cert.org/vuls/id/127584 http://www.kb.cert.org/vuls/id/MAPG-8G9PWX http://www.securityfocus.com/bid/48092 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •