VT-Designer Version 2.1.7.31 is vulnerable by the program populating objects with user supplied input via a file without first checking for validity, allowing attacker supplied input to be written to known memory locations. This may cause the program to crash or allow remote code execution.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106071 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-18-333-01 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/106071 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-18-333-01 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 03:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/106071 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-18-333-01 - Third Party Advisory, US Government Resource |
Information
Published : 2018-11-30 18:29
Updated : 2024-11-21 03:56
NVD link : CVE-2018-18987
Mitre link : CVE-2018-18987
CVE.ORG link : CVE-2018-18987
JSON object : View
Products Affected
invt
- vt-designer
CWE
CWE-502
Deserialization of Untrusted Data