Several heap-based buffer overflow vulnerabilities in WECON LeviStudioU version 1.8.56 and prior have been identified, which may allow arbitrary code execution. Mat Powell, Ziad Badawi, and Natnael Samson working with Trend Micro's Zero Day Initiative, reported these vulnerabilities to NCCIC.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106861 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-19-036-03 | Patch Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/106861 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-19-036-03 | Patch Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 04:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/106861 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-19-036-03 - Patch, Third Party Advisory, US Government Resource |
Information
Published : 2019-02-13 00:29
Updated : 2024-11-21 04:46
NVD link : CVE-2019-6539
Mitre link : CVE-2019-6539
CVE.ORG link : CVE-2019-6539
JSON object : View
Products Affected
we-con
- levistudiou