WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute code.
Workaround:
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-355-03 | third party advisory us government resource |
https://www.zerodayinitiative.com/advisories/ZDI-22-130/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-132/ | vdb entry third party advisory |