LAquis SCADA Versions 4.1.0.3870 and prior, when processing project files the application fails to sanitize user input prior to performing write operations on a stack object, which may allow an attacker to execute code under the current process.
References
Link | Resource |
---|---|
http://laquisscada.com/instale1.php | Product Vendor Advisory |
https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 | Third Party Advisory US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/151421 | Third Party Advisory |
http://laquisscada.com/instale1.php | Product Vendor Advisory |
https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 03:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://laquisscada.com/instale1.php - Product, Vendor Advisory | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 - Third Party Advisory, US Government Resource |
Information
Published : 2018-10-17 02:29
Updated : 2024-11-21 03:55
NVD link : CVE-2018-17901
Mitre link : CVE-2018-17901
CVE.ORG link : CVE-2018-17901
JSON object : View
Products Affected
lcds
- laquis_scada
CWE
CWE-787
Out-of-bounds Write