Multiple stack-based buffer overflows in ModbusDrv.exe in Schneider Electric Modbus Serial Driver 1.10 through 3.2 allow remote attackers to execute arbitrary code via a large buffer-size value in a Modbus Application Header.
                
            References
                    | Link | Resource | 
|---|---|
| http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202013-070-01 | Vendor Advisory | 
| http://ics-cert.us-cert.gov/advisories/ICSA-14-086-01 | Mitigation Third Party Advisory US Government Resource | 
| http://www.securityfocus.com/bid/66500 | Third Party Advisory VDB Entry | 
| https://www.exploit-db.com/exploits/45219/ | Exploit Third Party Advisory VDB Entry | 
| https://www.exploit-db.com/exploits/45220/ | Exploit Third Party Advisory VDB Entry | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2014-04-01 06:17
Updated : 2022-02-03 13:57
NVD link : CVE-2013-0662
Mitre link : CVE-2013-0662
CVE.ORG link : CVE-2013-0662
JSON object : View
Products Affected
                schneider_electric
- somachine
 
schneider-electric
- powersuite
 - pl7
 - twidosuite
 - sft2841
 - concept
 - unity_pro
 - unityloader
 - opc_factory_server
 - modbuscommdtm_sl
 - modbus_serial_driver
 - somove
 - somachine
 
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
