PT-2014-57: Stack-based buffer overflow in Honeywell EPKS

Vulnerable software

Honeywell EPKS
Version: R311

Link:
http://honeywell.com/

Severity level

Severity level: High
Impact: Remote code execution, denial of service
Access Vector: Remote

CVSS v2:
Base Score: 9.3
Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVE: not assigned

Software description

Honeywell Experion PKS is a cost-effective open control and safety system that expands the role of distributed control. Experion provides a safe, robust, scalable, plant-wide system with unprecedented connectivity through all levels of the plant.

Vulnerability description

The specialists of the Positive Research center have detected a Stack-based buffer overflow vulnerability in Honeywell EPKS.

Stack-based buffer overflow in pscdasrv.exe module when processing command opcodes on one of the TCP services allows remote attackers to execute arbitrary code or cause a denial of service.

How to fix

Update your sofware up to the latest version

Advisory status

06.03.2014 - Vendor gets vulnerability details
02.06.2014 - Vendor releases fixed version and details
18.11.2014 - Public disclosure

Credits

The vulnerability was detected by Alexander Tlyapov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2014-57

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

Threatscape