TippingPoint Digital Vaccine Laboratories
DID YOU KNOW... DVLabs team members gave 20 presentations throughout 2010. Abstracts and slides are available here.

Automated Solutions Modbus TCP Slave ActiveX Control Denial of Service Vulnerability

TPTI-07-15: September 17th, 2007


Affected Vendors

Affected Products

    Modbus RTU/ASCII/TCP Slave ActiveX Control

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 5598. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of the Automated Solutions Modbus TCP Slave ActiveX Control. Authentication is not required to exploit this vulnerability.

The specific flaw exists within MiniHMI.exe which binds to TCP port 502. When processing malformed Modbus requests on this port a controllable heap corruption can occur which may result in execution of arbitrary code.

Vendor Response

Automated Solutions has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2007-08-20 - Vulnerability reported to vendor
    2007-09-17 - Coordinated public release of advisory


This vulnerability was discovered by: