An issue was discovered in Fatek Automation PLC WinProladder Version 3.11 Build 14701. A stack-based buffer overflow vulnerability exists when the software application connects to a malicious server, resulting in a stack buffer overflow. This causes an exploitable Structured Exception Handler (SEH) overwrite condition that may allow remote code execution.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/94938 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-16-350-01 | Third Party Advisory US Government Resource |
https://www.exploit-db.com/exploits/42700/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
28 Oct 2021, 11:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fatek_automation:plc_winproladder_firmware:3.11:build_14701:*:*:*:*:*:* |
cpe:2.3:h:fatek:plc_winproladder:-:*:*:*:*:*:*:* cpe:2.3:o:fatek:plc_winproladder_firmware:3.11:build_14701:*:*:*:*:*:* |
References | (EXPLOIT-DB) https://www.exploit-db.com/exploits/42700/ - Third Party Advisory, VDB Entry |
Information
Published : 2017-02-13 21:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-8377
Mitre link : CVE-2016-8377
CVE.ORG link : CVE-2016-8377
JSON object : View
Products Affected
fatek
- plc_winproladder_firmware
- plc_winproladder
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer