Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary code via a long string in the (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud, or (11) IPAddress parameter to an ActiveX control in (a) webvact.ocx, (b) dvs.ocx, or (c) webdact.ocx.
References
Link | Resource |
---|---|
http://ics-cert.us-cert.gov/advisories/ICSA-14-198-02 | Third Party Advisory US Government Resource |
http://packetstormsecurity.com/files/128384/Advantech-WebAccess-dvs.ocx-GetColor-Buffer-Overflow.html | Exploit |
http://www.securityfocus.com/bid/68714 | Exploit |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2014-07-19 05:09
Updated : 2024-02-04 18:35
NVD link : CVE-2014-2364
Mitre link : CVE-2014-2364
CVE.ORG link : CVE-2014-2364
JSON object : View
Products Affected
advantech
- advantech_webaccess
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer