PT-2014-54: Heap-based buffer overflow in Honeywell EPKS
Vulnerable software
Honeywell EPKS
Version: R311
Link:
http://honeywell.com/
Severity level
Severity level: High
Impact: Remote code execution, denial of service
Access Vector: Remote
CVSS v2:
Base Score: 7.6
Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C)
CVE: not assigned
Software description
Honeywell Experion PKS is a cost-effective open control and safety system that expands the role of distributed control. Experion provides a safe, robust, scalable, plant-wide system with unprecedented connectivity through all levels of the plant.
Vulnerability description
The specialists of the Positive Research center have detected a Heap-based buffer overflow vulnerability in Honeywell EPKS.
Heap-based buffer overflow was discovered in ripsd.exe module in function sec_GetContext() which could lead to possible remote code execution or denial of service.
How to fix
Update your sofware up to the latest version
Advisory status
06.03.2014 - Vendor gets vulnerability details
02.06.2014 - Vendor releases fixed version and details
18.11.2014 - Public disclosure
Credits
The vulnerability was detected by Gleb Gritsai, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2014-54
Reports on the vulnerabilities previously discovered by Positive Research:
http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/