A stack-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer, which could allow an attacker to execute arbitrary code under the context of the process.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100526 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-17-241-02 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/100526 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-17-241-02 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 03:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/100526 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-17-241-02 - Third Party Advisory, US Government Resource |
Information
Published : 2017-08-30 18:29
Updated : 2024-11-21 03:10
NVD link : CVE-2017-12706
Mitre link : CVE-2017-12706
CVE.ORG link : CVE-2017-12706
JSON object : View
Products Affected
advantech
- webaccess