CVE-2014-9192

Trihedral Engineering Limited VTScada Integer Overflow

Description

Integer overflow in Trihedral Engineering VTScada (formerly VTS) 6.5 through 9.x before 9.1.20, 10.x before 10.2.22, and 11.x before 11.1.07 allows remote attackers to cause a denial of service (server crash) via a crafted request, which triggers a large memory allocation.

Remediation

Solution:

  • Trihedral Engineering Limited has created three updated versions of software. These software updates are available from Trihedral Engineering Ltd.’s FTP site: ftp://ftp.trihedral.com/VTS/ Version Information: * 11.1.09 – Latest build including newest features and fixes. Any installation key with a maintenance expiration date after January 1, 2014, will work this installation. * 10.2.22 –Recommended for all users of VTS 10. Any installation key with a maintenance expiration date after December 1, 2010, will work with this installation. * 09.1.20 – Recommended for all users prior to 10.0. Any installation key with a maintenance expiration date after December 1, 2009, will work with this installation. Help file notes for upgrading VTScada/VTS can be found at:  http://www.trihedral.com/help/#Op_Welcome/Wel_UpgradeNotes.htm If you have any questions or any difficulties with installing one of these updates, please call Trihedral Tech Support: 1-855-887-2232 1-902-835-1575 +44 (0) 1224 258910 for the United Kingdom

Categories

7.8
CVSS
Severity: High
CVSS 2.0 •
EPSS 0.73% Top 30%
Third-Party Advisory securityfocus.com Third-Party Advisory us-cert.gov
Affected: Trihedral Engineering VTS
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2014-9192?
CVE-2014-9192 has been scored as a high severity vulnerability.
How to fix CVE-2014-9192?
To fix CVE-2014-9192: Trihedral Engineering Limited has created three updated versions of software. These software updates are available from Trihedral Engineering Ltd.’s FTP site: ftp://ftp.trihedral.com/VTS/ Version Information: * 11.1.09 – Latest build including newest features and fixes. Any installation key with a maintenance expiration date after January 1, 2014, will work this installation. * 10.2.22 –Recommended for all users of VTS 10. Any installation key with a maintenance expiration date after December 1, 2010, will work with this installation. * 09.1.20 – Recommended for all users prior to 10.0. Any installation key with a maintenance expiration date after December 1, 2009, will work with this installation. Help file notes for upgrading VTScada/VTS can be found at:  http://www.trihedral.com/help/#Op_Welcome/Wel_UpgradeNotes.htm If you have any questions or any difficulties with installing one of these updates, please call Trihedral Tech Support: 1-855-887-2232 1-902-835-1575 +44 (0) 1224 258910 for the United Kingdom
Is CVE-2014-9192 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2014-9192 is being actively exploited. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2014-9192?
CVE-2014-9192 affects Trihedral Engineering VTS.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.