Vulnerability Description
A specially crafted configuration file could be used to cause a stack-based buffer overflow condition in the OPCTest.exe, which may allow remote code execution on Opto 22 PAC Project Professional versions prior to R9.4008, PAC Project Basic versions prior to R9.4008, PAC Display Basic versions prior to R9.4g, PAC Display Professional versions prior to R9.4g, OptoOPCServer version R9.4c and prior that were installed by PAC Project installer, versions prior to R9.4008, and OptoDataLink version R9.4d and prior that were installed by PAC Project installer, versions prior to R9.4008. Opto 22 suggests upgrading to the new product version as soon as possible.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opto22 | Optodatalink | <= r9.4d |
| Opto22 | Optoopcserver | <= r9.4c |
| Opto22 | Pac Display | < r9.4g |
| Opto22 | Pac Project | < r9.4008 |
Related Weaknesses (CWE)
References
- https://ics-cert.us-cert.gov/advisories/ICSA-15-120-01Third Party AdvisoryUS Government Resource
- https://ics-cert.us-cert.gov/advisories/ICSA-15-120-01Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2015-1007?
CVE-2015-1007 is a vulnerability with a CVSS score of 7.8 (HIGH). A specially crafted configuration file could be used to cause a stack-based buffer overflow condition in the OPCTest.exe, which may allow remote code execution on Opto 22 PAC Project Professional vers...
How severe is CVE-2015-1007?
CVE-2015-1007 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1007?
Check the references section above for vendor advisories and patch information. Affected products include: Opto22 Optodatalink, Opto22 Optoopcserver, Opto22 Pac Display, Opto22 Pac Project.