Full title: VIPA Automation WinPLC7 5.0.45.5921 Buffer Overflow Exploit Category: remote exploits Platform: windows This Metasploit module exploits a stack based buffer overflow found in VIPA Automation WinPLC7 versions 5.0.45.5921 and below. The overflow is triggered when WinPLC7 connects to a remote server and accepts a malicious packet. The first 2 bytes of this packet are read in and used as the size value for a later recv function. If a size value of sufficiently large size is supplied a stack buffer overflow will occur # 0day.today @ http://0day.today/