CVE-2014-0774
28.02.2014, 06:18
Stack-based buffer overflow in the C++ sample client in Schneider Electric OPC Factory Server (OFS) TLXCDSUOFS33 - 3.35, TLXCDSTOFS33 - 3.35, TLXCDLUOFS33 - 3.35, TLXCDLTOFS33 - 3.35, and TLXCDLFOFS33 - 3.35 allows local users to gain privileges via vectors involving a malformed configuration file.Enginsight
Vendor | Product | Version |
---|---|---|
schneider-electric | ofs_test_client_tlxcdlfofs33 | 3.35 |
schneider-electric | ofs_test_client_tlxcdltofs33 | 3.35 |
schneider-electric | ofs_test_client_tlxcdluofs33 | 3.35 |
schneider-electric | ofs_test_client_tlxcdstofs33 | 3.35 |
schneider-electric | ofs_test_client_tlxcdsuofs33 | 3.35 |
schneider-electric | opc_factory_server | 3.35 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-121 - Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory BufferThe software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
References