RSLinx OPC Automation ActiveX Control Stack Buffer Overflow Vulnerability

The RSLinx ActiveX control is prone to a remote stack-based buffer-overflow vulnerability that affects the 'RsiOPCAuto.OPCServer' ActiveX control.

Attackers can exploit this issue to execute arbitrary code within the context of an application (typically Internet Explorer) that uses the ActiveX control. Failed exploit attempts will result in a denial-of-service condition.

The following products are vulnerable:

Rockwell OPC Automation ActiveX Control version
RSLinx 2.3.1 Build 10


Privacy Statement
Copyright 2010, SecurityFocus