CVE-2024-7502

A crafted DPA file could force Delta Electronics DIAScreen to overflow a stack-based buffer, which could allow an attacker to execute arbitrary code.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-219-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:deltaww:diascreen:*:*:*:*:*:*:*:*

History

12 Aug 2024, 18:50

Type Values Removed Values Added
First Time Deltaww
Deltaww diascreen
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-219-01 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-219-01 - Third Party Advisory, US Government Resource
CWE CWE-787
CPE cpe:2.3:a:deltaww:diascreen:*:*:*:*:*:*:*:*

07 Aug 2024, 15:17

Type Values Removed Values Added
Summary
  • (es) Un archivo DPA manipulado podría obligar a Delta Electronics DIAScreen a desbordar un búfer basado en pila, lo que podría permitir a un atacante ejecutar código arbitrario.

06 Aug 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-06 17:15

Updated : 2024-08-12 18:50


NVD link : CVE-2024-7502

Mitre link : CVE-2024-7502

CVE.ORG link : CVE-2024-7502


JSON object : View

Products Affected

deltaww

  • diascreen
CWE
CWE-787

Out-of-bounds Write

CWE-121

Stack-based Buffer Overflow