CVE-2014-8269

Multiple stack-based buffer overflows in (1) HWOPOSScale.ocx and (2) HWOPOSSCANNER.ocx in Honeywell OPOS Suite before 1.13.4.15 allow remote attackers to execute arbitrary code via a crafted file that is improperly handled by the Open method.
Configurations

Configuration 1 (hide)

cpe:2.3:a:honeywell:opos_suite:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:18

Type Values Removed Values Added
References () http://www.kb.cert.org/vuls/id/659684 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/659684 - Third Party Advisory, US Government Resource
References () http://www.zerodayinitiative.com/advisories/ZDI-14-423/ - () http://www.zerodayinitiative.com/advisories/ZDI-14-423/ -
References () http://www.zerodayinitiative.com/advisories/ZDI-14-424/ - () http://www.zerodayinitiative.com/advisories/ZDI-14-424/ -

Information

Published : 2014-12-13 00:59

Updated : 2024-11-21 02:18


NVD link : CVE-2014-8269

Mitre link : CVE-2014-8269

CVE.ORG link : CVE-2014-8269


JSON object : View

Products Affected

honeywell

  • opos_suite
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer