TippingPoint Digital Vaccine Laboratories
DID YOU KNOW... Frost and Sullivan announced in their Feb. 2007 report, "Analysis of Vulnerability Discovery and Disclosure", that TippingPoint was the fastest growing discoverer of new vulnerabilities and the leader in the discovery of both high-severity and Microsoft vulnerabilities.

Automated Solutions Modbus TCP Slave ActiveX Control Denial of Service Vulnerability

TPTI-07-15: September 17th, 2007

CVE ID

Affected Vendors

Affected Products

    Modbus RTU/ASCII/TCP Slave ActiveX Control

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 5598. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of the Automated Solutions Modbus TCP Slave ActiveX Control. Authentication is not required to exploit this vulnerability.

The specific flaw exists within MiniHMI.exe which binds to TCP port 502. When processing malformed Modbus requests on this port a controllable heap corruption can occur which may result in execution of arbitrary code.

Vendor Response

Automated Solutions has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2007-08-20 - Vulnerability reported to vendor
    2007-09-17 - Coordinated public release of advisory

Credit

This vulnerability was discovered by: