Page 6 of 27 results (0.001 seconds)

CVSS: 10.0EPSS: 10%CPEs: 3EXPL: 3

Buffer overflow in the lm_tcp service in Invensys Wonderware InBatch 8.1 and 9.0, as used in Invensys Foxboro I/A Series Batch 8.1 and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted request to port 9001. Desbordamiento de búfer en el servicio lm_tcp en Invensys Wonderware InBatch v8.1 y v9.0, como el utilizado en Invensys Foxboro I/A Series Batch v8.1, permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente la ejecución de código de su elección a través de una petición manipulada al puerto 9001. • https://www.exploit-db.com/exploits/15707 http://aluigi.org/adv/inbatch_1-adv.txt http://iom.invensys.com/EN/Pages/IOM_CyberSecurityUpdates.aspx http://iom.invensys.com/EN/pdfLibrary/SecurityAlert_Invensys_SecurityAlert-LFSEC00000051_12-10.pdf http://secunia.com/advisories/42528 http://www.exploit-db.com/exploits/15707 http://www.kb.cert.org/vuls/id/647928 http://www.us-cert.gov/control_systems/pdf/ICSA-10-348-01.pdf http://www.vupen.com/english/advisories/2010/3244 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 3%CPEs: 9EXPL: 0

Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method. Desbordamiento de búfer basado en pila en la interfaz IConfigurationAccess en el control ActiveX Invensys Wonderware Archestra ConfigurationAccessComponent de Wonderware Application Server (WAS) anterior a v3.1 SP2 P01, como el usado en el Wonderware Archestra Integrated Development Environment (IDE) y el InFusion Integrated Engineering Environment (IEE), permite a los atacantes remotos ejecutar código a su elección a través del primer argumento del método UnsubscribeData. • http://www.kb.cert.org/vuls/id/703189 http://www.kb.cert.org/vuls/id/MORO-87MHPT http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108 https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •