Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on May 12th, 2019 📆 | 2287 Views ⚑

0

Opto 22 PAC Project Professional Heap-based memory corruption


iSpeech.org

CVSS Meta Temp Score Current Exploit Price (≈)
9.4 $0-$5k

A vulnerability classified as very critical has been found in Opto 22 PAC Project Professional, PAC Project Basic, OptoOPCServer, OptoDataLink, PAC Display Basic and PAC Display Professional (Project Management Software). This affects an unknown function. The manipulation with an unknown input leads to a memory corruption vulnerability (Heap-based). CWE is classifying the issue as CWE-119. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:

A vulnerable file in Opto 22 PAC Project Professional versions prior to R9.4006, PAC Project Basic versions prior to R9.4006, PAC Display Basic versions prior to R9.4f, PAC Display Professional versions prior to R9.4f, OptoOPCServer versions prior to R9.4c, and OptoDataLink version R9.4d and prior versions that were installed by PAC Project installer, versions prior to R9.4006, is susceptible to a heap-based buffer overflow condition that may allow remote code execution on the target system. Opto 22 suggests upgrading to the new product version as soon as possible.

The weakness was shared 05/10/2019. This vulnerability is uniquely identified as CVE-2015-1006 since 01/10/2015. The exploitability is told to be easy. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 05/11/2019).

Upgrading eliminates this vulnerability.

Vendor

Name

VulDB Meta Base Score: 9.8
VulDB Meta Temp Score: 9.4

VulDB Base Score: 9.8
VulDB Temp Score: 9.4
VulDB Vector: ?
VulDB Reliability: ?

NVD Base Score: 9.8
NVD Vector: ?

AV AC Au C I A
? ? ? ? ? ?
? ? ? ? ? ?
? ? ? ? ? ?
Vector Complexity Authentication Confidentiality Integrity Availability
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock


VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?

NVD Base Score: ?

Class: Memory corruption / Heap-based (CWE-119)
Local: No
Remote: Yes

Availability: ?
Status: Not defined

Price Prediction: ?
Current Price Estimation: ?


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: Upgrade
Status: ?
0-Day Time: ?01/10/2015 CVE assigned
05/10/2019 +1581 days Advisory disclosed
05/11/2019 +1 days VulDB entry created
05/11/2019 +0 days VulDB last updateCVE: CVE-2015-1006 (?)Created: 05/11/2019 02:48 AM
Complete: ?

Enable the mail alert feature now!

https://vuldb.com/?id.134559

Tagged with:



Comments are closed.