We've just released PAC Project software 9.4008, an important update that eliminates a security vulnerability recently identified in OptoOPCServer (specifically in OPC Test Client, a separate application previously included with OptoOPCServer.)
This PAC Project update also incorporates an earlier OptoOPCServer security fix included in PAC Project 9.4006.
We recommend that all PAC Project users install this updated software. If installing software is not an option, you can eliminate the OPC Test Client vulnerability by following instructions in Opto 22 KnowledgeBase article KB84610.
Download updated PAC Project software from the Opto 22 website here:
http://www.opto22.com/site/downloads/dl_downloads.aspx
For more information, see:
- Opto 22 KnowledgeBase article KB84610 "Vulnerability in OPC Test Client"
- Opto 22 KnowledgeBase article KB84434 "Heap buffer overrun vulnerability in OptoOPCServer"
Questions? Please contact Opto 22 Product Support.
OptoNews May 21, 2015 - Read more in this issue:
- groov 3.0 adds event notifications & more
- New prices on groov 3.0 platforms
- Tech tip: Mini-lessons on PACs, PAC Control