Published on May 12th, 2019 📆 | 2287 Views ⚑
0Opto 22 PAC Project Professional Heap-based memory corruption
CVSS Meta Temp Score | Current Exploit Price (≈) |
---|---|
9.4 | $0-$5k |
A vulnerability classified as very critical has been found in Opto 22 PAC Project Professional, PAC Project Basic, OptoOPCServer, OptoDataLink, PAC Display Basic and PAC Display Professional (Project Management Software). This affects an unknown function. The manipulation with an unknown input leads to a memory corruption vulnerability (Heap-based). CWE is classifying the issue as CWE-119. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
A vulnerable file in Opto 22 PAC Project Professional versions prior to R9.4006, PAC Project Basic versions prior to R9.4006, PAC Display Basic versions prior to R9.4f, PAC Display Professional versions prior to R9.4f, OptoOPCServer versions prior to R9.4c, and OptoDataLink version R9.4d and prior versions that were installed by PAC Project installer, versions prior to R9.4006, is susceptible to a heap-based buffer overflow condition that may allow remote code execution on the target system. Opto 22 suggests upgrading to the new product version as soon as possible.
The weakness was shared 05/10/2019. This vulnerability is uniquely identified as CVE-2015-1006 since 01/10/2015. The exploitability is told to be easy. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 05/11/2019).
Upgrading eliminates this vulnerability.
Vendor
Name
VulDB Meta Base Score: 9.8
VulDB Meta Temp Score: 9.4
VulDB Base Score: 9.8
VulDB Temp Score: 9.4
VulDB Vector: ?
VulDB Reliability: ?
NVD Base Score: 9.8
NVD Vector: ?
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
? | ? | ? | ? | ? | ? |
? | ? | ? | ? | ? | ? |
? | ? | ? | ? | ? | ? |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
NVD Base Score: ?
Class: Memory corruption / Heap-based (CWE-119)
Local: No
Remote: Yes
Availability: ?
Status: Not defined
Price Prediction: ?
Current Price Estimation: ?
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: Upgrade
Status: ?
0-Day Time: ?01/10/2015 CVE assigned
05/10/2019 Advisory disclosed
05/11/2019 VulDB entry created
05/11/2019 VulDB last updateCVE: CVE-2015-1006 (?)Created: 05/11/2019 02:48 AM
Complete: ?
Enable the mail alert feature now!
https://vuldb.com/?id.134559
Gloss