Loading

PN656 | RSLinx Classic OPC Automation ActiveX component vulnerability could allow arbitrary code execution

Severity:
High
Advisory ID:
PN656
发布日期:
June 28, 2011
上次更新时间:
June 28, 2011
Revision Number:
1.0
Known Exploited Vulnerability (KEV):
否
Corrected:
否
Workaround:
否
摘要
RSLinx Classic OPC Automation ActiveX component vulnerability could allow arbitrary code execution

Introduction

Description

June 28, 2011 - Version 1.0

A vulnerability has been discovered in the RsiOPCAuto.dll version 1.1.8.0 ActiveX component included with specific versions of RSLinx Classic that can allow for the execution or arbitrary code. This vulnerability affects the following:

  • RSLinx Classic version 2.54 and earlier

Details of this vulnerability are as follows:

The vulnerability results from a boundary error in the RsiOPCAuto.OPCServer ActiveX control. When a specific parameter in this control receives an excessively long debug string, a buffer overflow condition can allow for the execution of arbitrary and potentially malicious code.

There are currently no known active exploits of this vulnerability.

To help reduce the likelihood of exploitation and associated security risk, Rockwell Automation recommends the following mitigation strategy:

Affected Software

Upgrade or patch software

RSLinx Classic version 2.54 and earlier that include any version of RsiOPCAuto.dll Option 1 -->

Recommended:

RSLinx Classic version 2.55

NOTE: RSLinx Classic versions 2.55 and higher use OpcDAauto.dll from OPC Foundation and will no longer use RsiOPCAuto.dll. Custom software relying on RsiOPCAuto.dll will be affected.

Option 2 --> If unable to upgrade to version 2.55:

Apply software patch for RsiOPCAuto.dll to address this vulnerability in RSLinx Classic version 2.54 and all prior versions. The patch is available in the following technote: Answer ID 449288

NOTE: Rockwell Automation recommends all users applying this RSLinx Classic patch plan to upgrade to RSLinx Classic version 2.55 at first convenience given RSLinx Classic’s transition from RsiOPCAuto.dll to OpcDAauto.dll.

Rockwell Automation remains committed to making additional security enhancements to our systems in the future.

For more information and for assistance with assessing the state of security of your existing controls system, including improving your system-level security when using Rockwell Automation and other vendor controls products, you can visit the Rockwell Automation Security Solutions web site at http://www.rockwellautomation.com/solutions/security.

KCS Status

Released

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Rockwell Automation 主页 Chevron RightChevron Right
  2. Chevron LeftChevron Left Trust Center Chevron RightChevron Right
  3. Chevron LeftChevron Left Industrial Security Adv Chevron RightChevron Right
  4. Chevron LeftChevron Left Industrial Security Advisory Detail Chevron RightChevron Right
请更新您的Cookies偏好以继续.
此功能需要Cookies来增强您的体验。请更新您的系统偏好以允许使用这些Cookies:
  • 社交媒体Cookies
  • 功能Cookies
  • 性能 Cookies
  • 市场营销Cookies
  • 所有Cookies
您可以随时更新您的系统偏好。如需了解更多信息,请参阅我们的 {0} 隐私政策
CloseClose