#VU49158 Uncontrolled memory allocation in FactoryTalk Linx - CVE-2020-5806

 

#VU49158 Uncontrolled memory allocation in FactoryTalk Linx - CVE-2020-5806

Published: December 28, 2020 / Updated: January 29, 2021


Vulnerability identifier: #VU49158
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2020-5806
CWE-ID: CWE-789
Exploitation vector: Local access
Exploit availability: Public exploit is available
Vulnerable software:
FactoryTalk Linx
Software vendor:
Rockwell Automation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to uncontrolled memory allocation in RSLinxNG.exe. An attacker-controlled memory allocation size can be passed to the C++ new operator in the CServerManager::HandleBrowseLoadIconStreamRequest function in messaging.dll. A local attacker can send a specially crafted LoadIconStream message to 127.0.0.1:7153 to cause the new operator to allocate a large amount of memory. It's been observed that a large allocation size (i.e., 0xffffffff) can cause an unhandled exception in RSLinxNG.exe, which results in process termination of RSLinxNG.exe.

A local user can perform a denial of service attack.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links