Loading

PN656 | RSLinx Classic OPC Automation ActiveX component vulnerability could allow arbitrary code execution

Severity:
High
Advisory ID:
PN656
Fecha de publicación:
June 28, 2011
Última actualización:
June 28, 2011
Revision Number:
1.0
Known Exploited Vulnerability (KEV):
No
Corrected:
No
Workaround:
No
Resumen
RSLinx Classic OPC Automation ActiveX component vulnerability could allow arbitrary code execution

Introduction

Description

June 28, 2011 - Version 1.0

A vulnerability has been discovered in the RsiOPCAuto.dll version 1.1.8.0 ActiveX component included with specific versions of RSLinx Classic that can allow for the execution or arbitrary code. This vulnerability affects the following:

  • RSLinx Classic version 2.54 and earlier

Details of this vulnerability are as follows:

The vulnerability results from a boundary error in the RsiOPCAuto.OPCServer ActiveX control. When a specific parameter in this control receives an excessively long debug string, a buffer overflow condition can allow for the execution of arbitrary and potentially malicious code.

There are currently no known active exploits of this vulnerability.

To help reduce the likelihood of exploitation and associated security risk, Rockwell Automation recommends the following mitigation strategy:

Affected Software

Upgrade or patch software

RSLinx Classic version 2.54 and earlier that include any version of RsiOPCAuto.dll Option 1 -->

Recommended:

RSLinx Classic version 2.55

NOTE: RSLinx Classic versions 2.55 and higher use OpcDAauto.dll from OPC Foundation and will no longer use RsiOPCAuto.dll. Custom software relying on RsiOPCAuto.dll will be affected.

Option 2 --> If unable to upgrade to version 2.55:

Apply software patch for RsiOPCAuto.dll to address this vulnerability in RSLinx Classic version 2.54 and all prior versions. The patch is available in the following technote: Answer ID 449288

NOTE: Rockwell Automation recommends all users applying this RSLinx Classic patch plan to upgrade to RSLinx Classic version 2.55 at first convenience given RSLinx Classic’s transition from RsiOPCAuto.dll to OpcDAauto.dll.

Rockwell Automation remains committed to making additional security enhancements to our systems in the future.

For more information and for assistance with assessing the state of security of your existing controls system, including improving your system-level security when using Rockwell Automation and other vendor controls products, you can visit the Rockwell Automation Security Solutions web site at http://www.rockwellautomation.com/solutions/security.

KCS Status

Released

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Página principal de Rockwell Automation Chevron RightChevron Right
  2. Chevron LeftChevron Left Trust Center Chevron RightChevron Right
  3. Chevron LeftChevron Left Industrial Security Adv Chevron RightChevron Right
  4. Chevron LeftChevron Left Industrial Security Advisory Detail Chevron RightChevron Right
Actualice sus preferencias de cookies para continuar.
Esta función requiere cookies para mejorar su experiencia. Actualice sus preferencias para permitir estas cookies.:
  • Cookies de Redes Sociales
  • Cookies Funcionales
  • Cookies de Performance
  • Cookies de Marketing
  • Todas las cookies
Puede actualizar sus preferencias en cualquier momento. Para más información, vea nuestro Política de Privacidad
CloseClose