Gesytec Easylon OPC Server prior to 2.3.44 does not properly validate server handles, which allows remote malicious users to execute arbitrary code or cause a denial of service via unspecified network traffic to the OLE for Process Control (OPC) interface, probably related to free operations on arbitrary memory addresses through certain Remove functions, and read and write operations on arbitrary memory addresses through certain Set, Read, and Write functions.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gesytec easylon opc server 2.30.32 |