PT-2014-42: Heap-based buffer overflow in Honeywell EPKS Vulnerable softwareHoneywell EPKS Version: R311Link: http://honeywell.com/Severity levelSeverity level: High Impact: Remote code execution, denial of service Access Vector: Remote CVSS v2: Base Score: 7.6 Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C)CVE: not assignedSoftware descriptionHoneywell Experion PKS is a cost-effective open control and safety system that expands the role of distributed control. Experion provides a safe, robust, scalable, plant-wide system with unprecedented connectivity through all levels of the plant. Vulnerability descriptionThe specialists of the Positive Research center have detected a Heap-based buffer overflow vulnerability in Honeywell EPKS.Heap-based buffer overflow was discovered in function svc_deltag() from dual_onsrv.exe module which could lead to possible remote code execution or denial of serviceHow to fixUpdate your sofware up to the latest versionAdvisory status 06.03.2014 - Vendor gets vulnerability details 02.06.2014 - Vendor releases fixed version and details 18.11.2014 - Public disclosureCreditsThe vulnerability was detected by Alexander Tlyapov and Gleb Gritsai, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2014-42 Reports on the vulnerabilities previously discovered by Positive Research:http://www.ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/