RSLinx OPC Automation ActiveX Control Stack Buffer Overflow Vulnerability
The RSLinx ActiveX control is prone to a remote stack-based buffer-overflow vulnerability that affects the 'RsiOPCAuto.OPCServer' ActiveX control.
Attackers can exploit this issue to execute arbitrary code within the context of an application (typically Internet Explorer) that uses the ActiveX control. Failed exploit attempts will result in a denial-of-service condition.
The following products are vulnerable:
Rockwell OPC Automation ActiveX Control version 220.127.116.11
RSLinx 2.3.1 Build 10