Multiple stack-based buffer overflows in Moxa VPort ActiveX SDK Plus before 2.8 allow remote attackers to insert assembly-code lines via vectors involving a regkey (1) set or (2) get command.
References
Link | Resource |
---|---|
http://www.moxa.com/support/download.aspx?d_id=2114 | Patch |
http://www.securityfocus.com/bid/73960 | |
http://www.zerodayinitiative.com/advisories/ZDI-15-392 | |
https://ics-cert.us-cert.gov/advisories/ICSA-15-097-01 | Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2015-05-26 15:59
Updated : 2024-02-28 15:21
NVD link : CVE-2015-0986
Mitre link : CVE-2015-0986
CVE.ORG link : CVE-2015-0986
JSON object : View
Products Affected
moxa
- vport_activex_sdk_plus
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer