PT-2014-49: Stack-based buffer overflow in Honeywell EPKS Vulnerable softwareHoneywell EPKS Version: R311Link: http://honeywell.com/Severity levelSeverity level: High Impact: Remote code execution, denial of service Access Vector: Remote CVSS v2: Base Score: 9.3 Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)CVE: not assignedSoftware descriptionHoneywell Experion PKS is a cost-effective open control and safety system that expands the role of distributed control. Experion provides a safe, robust, scalable, plant-wide system with unprecedented connectivity through all levels of the plant. Vulnerability descriptionThe specialists of the Positive Research center have detected a Stack-based buffer overflow vulnerability in Honeywell EPKS.Stack-based buffer overflow was discovered in hscodbcn.exe module when using function unmarshallCharArray () for copying data from packet in stack buffer of static size without checking input which could lead to possible remote code execution or denial of service.How to fixUpdate your sofware up to the latest versionAdvisory status 06.03.2014 - Vendor gets vulnerability details 02.06.2014 - Vendor releases fixed version and details 18.11.2014 - Public disclosureCreditsThe vulnerability was detected by Alexander Tlyapov, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2014-49 Reports on the vulnerabilities previously discovered by Positive Research:http://www.ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/