Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://secunia.com/advisories/43116 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/47596 | vdb entry |
http://secunia.com/secunia_research/2011-37/ | vendor advisory |
http://www.vupen.com/english/advisories/2011/1116 | vdb entry vendor advisory |
http://ics-cert.us-cert.gov/advisories/ICSA-12-249-03 | |
http://secunia.com/advisories/42928 | third party advisory vendor advisory |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-137-02.pdf | |
http://www.vupen.com/english/advisories/2011/1115 | vdb entry vendor advisory |
http://www.indusoft.com/hotfixes/hotfixes.php | |
http://secunia.com/secunia_research/2011-36/ | vendor advisory |
http://www.advantechdirect.com/eMarketingPrograms/AStudio_Patch/AStudio7.0_Patch_Final.htm |