CVE-2014-0779 is a vulnerability in Schneider Electric Clearscada
Published on March 14, 2014
Schneider Electric StruxureWare SCADA Expert ClearSCADA Improper Restriction of Operations within the Bounds of a Memory Buffer
The PLC driver in ServerMain.exe in the Kepware KepServerEX 4 component in Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R2 build 71.4165, 2010 R2.1 build 71.4325, 2010 R3 build 72.4560, 2010 R3.1 build 72.4644, 2013 R1 build 73.4729, 2013 R1.1 build 73.4832, 2013 R1.1a build 73.4903, 2013 R1.2 build 73.4955, and 2013 R2 build 74.5094 allows remote attackers to cause a denial of service (application crash) via a crafted OPF file (aka project file).
Weakness Type
What is a Buffer Overflow Vulnerability?
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CVE-2014-0779 has been classified to as a Buffer Overflow vulnerability or weakness.
Products Associated with CVE-2014-0779
Want to know whenever a new CVE is published for Schneider Electric Clearscada? stack.watch will email you.
Affected Versions
Schneider Electric ClearSCADA:- Version 2010 R2 (build 71.4165) is affected.
- Version 2010 R2.1 (build 71.4325) is affected.
- Version 2010 R3 (build 72.4560) is affected.
- Version 2010 R3.1 (build 72.4644) is affected.
- Version 2013 R1 (build 73.4729) is affected.
- Version 2013 R1.1 (build 73.4832) is affected.
- Version 2013 R1.1a (build 73.4903) is affected.
- Version 2013 R1.2 (build 73.4955) is affected.
- Version 2013 R2 (build 74.5094) is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.