Short Name |
APP:MISC:RKWL-RRDATA-OF |
---|---|
Severity |
Major |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
APP |
Keywords |
Rockwell Automation RSLinx Classic Forward Open Electronic Key Stack Buffer Overflow |
Release Date |
2019/03/13 |
Update Number |
3151 |
Supported Platforms |
srx-17.3+, srx-branch-17.4+, vsrx-15.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against Rockwell Automation RSLinx Classic. The vulnerability is due to a flaw in the module that processes CIP SendRRData messages with overly large size field within the Electronic Key segment in the Connection Path. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted packet to the vulnerable service. Successful exploitation could lead to buffer overflow or crash of the vulnerable application.
A vulnerability was found in Rockwell Automation RSLinx Classic versions 4.10.00 and prior. An input validation issue in a .dll file of RSLinx Classic where the data in a Forward Open service request is passed to a fixed size buffer, allowing an attacker to exploit a stack-based buffer overflow condition.