CVE-2018-18993

Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application.
References
Link Resource
http://www.securityfocus.com/bid/106106 Third Party Advisory VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/106106 Third Party Advisory VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*
cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*
cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:57

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/106106 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/106106 - Third Party Advisory, VDB Entry
References () https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 - Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 - Third Party Advisory, US Government Resource

Information

Published : 2018-12-04 22:29

Updated : 2024-11-21 03:57


NVD link : CVE-2018-18993

Mitre link : CVE-2018-18993

CVE.ORG link : CVE-2018-18993


JSON object : View

Products Affected

omron

  • cx-one
  • cx-programmer
  • cx-server
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write