Executive Summary

Informations
Name CVE-2010-4709 First vendor Publication 2011-01-28
Vendor Cve Last vendor Modification 2017-08-17

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.6 Attack Range Network
Cvss Impact Score 10 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Heap-based buffer overflow in Automated Solutions Modbus/TCP Master OPC Server before 3.0.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a MODBUS response packet with a crafted length field.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4709

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 33

Open Source Vulnerability Database (OSVDB)

Id Description
70637 Automated Solutions Modbus/TCP Master OPC Server MODBUS Protocol Response Pac...

Modbus/TCP Master OPC Server is prone to an overflow condition. The program fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted packet, a local attacker can potentially execute arbitrary code.

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/45974
CERT-VN http://www.kb.cert.org/vuls/id/768840
CONFIRM http://automatedsolutions.com/pub/asmbtcpopc/readme.htm
EXPLOIT-DB http://www.exploit-db.com/exploits/16040
MISC http://www.us-cert.gov/control_systems/pdf/ICSA-10-322-02A.pdf
SECUNIA http://secunia.com/advisories/43029
VUPEN http://www.vupen.com/english/advisories/2011/0209
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/64944

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2021-05-04 12:12:39
  • Multiple Updates
2021-04-22 01:13:43
  • Multiple Updates
2020-05-23 00:27:17
  • Multiple Updates
2017-08-17 09:23:13
  • Multiple Updates
2016-04-26 20:19:27
  • Multiple Updates
2013-05-10 23:39:15
  • Multiple Updates