HIGH · 7.8

CVE-2015-1007

A specially crafted configuration file could be used to cause a stack-based buffer overflow condition in the OPCTest.exe, which may allow remote code execution on Opto 22 PAC Project Professional vers...

Vulnerability Description

A specially crafted configuration file could be used to cause a stack-based buffer overflow condition in the OPCTest.exe, which may allow remote code execution on Opto 22 PAC Project Professional versions prior to R9.4008, PAC Project Basic versions prior to R9.4008, PAC Display Basic versions prior to R9.4g, PAC Display Professional versions prior to R9.4g, OptoOPCServer version R9.4c and prior that were installed by PAC Project installer, versions prior to R9.4008, and OptoDataLink version R9.4d and prior that were installed by PAC Project installer, versions prior to R9.4008. Opto 22 suggests upgrading to the new product version as soon as possible.

CVSS Score

7.8

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
Opto22Optodatalink<= r9.4d
Opto22Optoopcserver<= r9.4c
Opto22Pac Display< r9.4g
Opto22Pac Project< r9.4008

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-1007?

CVE-2015-1007 is a vulnerability with a CVSS score of 7.8 (HIGH). A specially crafted configuration file could be used to cause a stack-based buffer overflow condition in the OPCTest.exe, which may allow remote code execution on Opto 22 PAC Project Professional vers...

How severe is CVE-2015-1007?

CVE-2015-1007 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-1007?

Check the references section above for vendor advisories and patch information. Affected products include: Opto22 Optodatalink, Opto22 Optoopcserver, Opto22 Pac Display, Opto22 Pac Project.