{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"IntegraXor","vendor":"Ecava","versions":[{"lessThanOrEqual":"4.1.4380","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Luigi Auriemma"}],"datePublic":"2014-01-15T07:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Stack-based buffer overflow in the SCADA server in Ecava IntegraXor before 4.1.4390 allows remote attackers to cause a denial of service (system crash) by triggering access to DLL code located in the IntegraXor directory.</p>"}],"value":"Stack-based buffer overflow in the SCADA server in Ecava IntegraXor before 4.1.4390 allows remote attackers to cause a denial of service (system crash) by triggering access to DLL code located in the IntegraXor directory."}],"metrics":[{"cvssV2_0":{"accessComplexity":"LOW","accessVector":"NETWORK","authentication":"NONE","availabilityImpact":"COMPLETE","baseScore":7.8,"confidentialityImpact":"NONE","integrityImpact":"NONE","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","version":"2.0"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-121","description":"CWE-121","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2025-08-25T23:46:30.088Z"},"references":[{"name":"102171","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://osvdb.org/102171"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/"},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-14-016-01"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Ecava Sdn Bhd has issued a customer notification that details this \nvulnerability and provides mitigation guidance to its customers. Ecava \nSdn Bhd recommends users download and install the update, IntegraXor \nSCADA Server 4.1.4390, from their support Web site:</p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http://www.integraxor.com/download/rc.msi?4.1.4390\">http://www.integraxor.com/download/rc.msi?4.1.4390</a></p><p>For additional information, please see Ecava’s vulnerability note:</p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/\">http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/</a></p>\n\n<br>"}],"value":"Ecava Sdn Bhd has issued a customer notification that details this \nvulnerability and provides mitigation guidance to its customers. Ecava \nSdn Bhd recommends users download and install the update, IntegraXor \nSCADA Server 4.1.4390, from their support Web site:\n\n\n http://www.integraxor.com/download/rc.msi?4.1.4390 \n\nFor additional information, please see Ecava’s vulnerability note:\n\n\n http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/"}],"source":{"advisory":"ICSA-14-016-01","discovery":"EXTERNAL"},"title":"Ecava IntegraXor Stack-based Buffer Overflow","x_generator":{"engine":"Vulnogram 0.2.0"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","ID":"CVE-2014-0753","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Stack-based buffer overflow in the SCADA server in Ecava IntegraXor before 4.1.4390 allows remote attackers to cause a denial of service (system crash) by triggering access to DLL code located in the IntegraXor directory."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"102171","refsource":"OSVDB","url":"http://osvdb.org/102171"},{"name":"http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/","refsource":"CONFIRM","url":"http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/"},{"name":"http://ics-cert.us-cert.gov/advisories/ICSA-14-016-01","refsource":"MISC","url":"http://ics-cert.us-cert.gov/advisories/ICSA-14-016-01"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T09:27:19.521Z"},"title":"CVE Program Container","references":[{"name":"102171","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://osvdb.org/102171"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.integraxor.com/blog/buffer-overflow-vulnerability-note/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://ics-cert.us-cert.gov/advisories/ICSA-14-016-01"}]}]},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2014-0753","datePublished":"2014-01-21T01:00:00.000Z","dateReserved":"2014-01-02T00:00:00.000Z","dateUpdated":"2025-08-25T23:46:30.088Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}