Schneider Mitigates Buffer Overflow

Friday, March 13, 2015 @ 12:03 PM gHale


Schneider Electric produced a patch that mitigates a buffer overflow vulnerability in its Pelco DS-NVs software package, according to a report on ICS-CERT.

This remotely exploitable vulnerability came to HP’s Zero Day Initiative (ZDI) from researchers Ariele Caltabiano and Andrea Micalizzi.

RELATED STORIES
Cimon Fixes DLL Hijacking Vulnerability
ABB Updates HART Device DTM
SCADA Engine Fixes OPC Server Holes
Elipse E3 Process Control Vulnerability Fixed

Pelco DS-NVs, Version 7.6.32 and prior versions suffers from the issue.

Successfully exploiting this vulnerability could cause a buffer overflow that may allow remote code execution.

Schneider Electric’s corporate headquarters is located in Paris, France, and maintains offices in more than 100 countries worldwide.

The affected products, Pelco DS-NVs, are IP video management software. According to Schneider Electric, the Pelco DS-NVs software works across several sectors including the commercial facilities sector. Schneider Electric estimates these products see use worldwide.

The affected products contain a vulnerable DLL susceptible to a buffer overflow condition that could result in remote code execution.

CVE-2015-0982 is the case number assigned to this vulnerability, which ZDI calculated a CVSS v2 base score of 7.5.

No known public exploits specifically target this vulnerability. An attacker with a low skill would be able to exploit this vulnerability.

Schneider Electric released Version 7.8.90 to remediate the vulnerability. Version 7.8.90 is available for download on the Schneider Electric’s web site.

Click here to download Schneider Electric’s vulnerability disclosure.



Leave a Reply

You must be logged in to post a comment.