Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple stack-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution.
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-128-01 | third party advisory us government resource |
https://www.zerodayinitiative.com/advisories/ZDI-20-590/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-624/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-625/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-619/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-634/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-633/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-592/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-591/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-20-622/ | vdb entry third party advisory |