SB2018090501 - Remote code execution in Opto22 PAC Control Basic and PAC Control Professional



SB2018090501 - Remote code execution in Opto22 PAC Control Basic and PAC Control Professional

Published: September 5, 2018

Security Bulletin ID SB2018090501
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Stack-based buffer overflow (CVE-ID: CVE-2018-04154)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to stack-based buffer overflow when using a maliciously crafted PAC Control strategy. A remote unauthenticated attacker can edit an OptoScript block containing a string literal that is longer than 63 characters and has no spaces, trigger memory corruption and cause the service to crash or execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.