A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. The application lacks proper validation of the length of user-supplied data prior to copying it to a stack-based buffer, which could allow an attacker to execute arbitrary code under the context of the process.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101685 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-17-306-02 | Third Party Advisory US Government Resource |
https://www.exploit-db.com/exploits/43340/ | |
http://www.securityfocus.com/bid/101685 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-17-306-02 | Third Party Advisory US Government Resource |
https://www.exploit-db.com/exploits/43340/ |
Configurations
History
21 Nov 2024, 03:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/101685 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-17-306-02 - Third Party Advisory, US Government Resource | |
References | () https://www.exploit-db.com/exploits/43340/ - |
Information
Published : 2017-11-06 22:29
Updated : 2024-11-21 03:11
NVD link : CVE-2017-14016
Mitre link : CVE-2017-14016
CVE.ORG link : CVE-2017-14016
JSON object : View
Products Affected
advantech
- webaccess