Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-0986 (GCVE-0-2014-0986)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/69531 | ||
cve@mitre.org | https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/69531 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01 | Third Party Advisory, US Government Resource |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:34:40.488Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01" }, { "name": "69531", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69531" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-05-14T16:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01" }, { "name": "69531", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69531" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-0986", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01" }, { "name": "69531", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69531" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-0986", "datePublished": "2014-09-20T10:00:00", "dateReserved": "2014-01-07T00:00:00", "dateUpdated": "2024-08-06T09:34:40.488Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-0986\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-09-20T10:55:03.997\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de buffer basado en pila en Advantech WebAccess (antiguamente BroadWin WebAccess) 7.2 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro GotoCmd.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:advantech:advantech_webaccess:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B96EC24-9006-4AEE-955A-9D0ACDEF284D\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/69531\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/69531\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
var-201409-0440
Vulnerability from variot
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter. Advantech WebAccess is an IE-based HMI/SCADA monitoring software featuring all engineering projects, database setup, drawing and software management using standard browsers over the internet or intranet. A buffer overflow vulnerability exists in Advantech WebAccess. An attacker exploits a vulnerability to execute arbitrary code in the context of an affected application or to crash the entire application. Advantech WebAccess is prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Failed exploit attempts will likely cause a denial-of-service condition. Advantech WebAccess 7.2 is vulnerable; other versions may also be affected. Advantech WebAccess is a browser-based HMI/SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. Core Security - Corelabs Advisory http://corelabs.coresecurity.com/
Advantech WebAccess Vulnerabilities
-
Advisory Information
Title: Advantech WebAccess Vulnerabilities Advisory ID: CORE-2014-0005 Advisory URL: http://www.coresecurity.com/advisories/advantech-webaccess-vulnerabilities Date published: 2014-09-02 Date of last update: 2014-09-01 Vendors contacted: Advantech Release mode: User release
-
Vulnerability Description
Advantech WebAccess [1] is a browser-based software package for human-machine interfaces HMI, and supervisory control and data acquisition SCADA.
-
WebAccess 7.2 .
-
Non-vulnerable packages
. AdvantechWebAccessUSANode_20140730_3.4.3
-
Vendor Information, Solutions and Workarounds
Advantech has addressed the vulnerability in WebAccess by issuing an update located at http://webaccess.advantech.com/downloads_software.php
Given that this is a client-side vulnerability, affected users should avoid opening untrusted '.html' files. Core Security also recommends those affected use third party software such as Sentinel [4] or EMET [3] that could help to prevent the exploitation of affected systems to some extent.
-
Credits
This vulnerability was discovered and researched by Ricardo Narvaja from Core Security Exploit Writers Team.
Core Security Advisories Team would also like to thank ICS-CERT Coordination Center for their assistance during the vulnerability reporting process.
-
Below is shown the result of opening a malicious html file with a long NodeName parameter, an attacker can overflow the stack buffer mentioned above and overwrite the SEH (Structured Exception Handler), enabling arbitrary code execution on the machine.
/-----
EAX 03A39942 ASCII "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB..." ECX 0162B720 EDX 01630000 xpsp2res.01630000 EBX 0162B720 ESP 0162B454 EBP 0162B460 ESI 0162B4D8 EDI 03A31E98 EIP 064EA6D4 webvact.064EA6D4
-----/
/-----
SEH chain of thread 000016CC Address SE handler 0162DB40 42424242
-----/
-
Report Timeline . 2014-05-06: Core Security notifies Advantech of the vulnerability. Publication date is set for May 26th, 2014. 2014-05-09: CORE asks for a reply. 2014-05-26: First release date missed. 2014-05-26: Core Security notifies that the issues were reported 2 weeks ago and there was no reply since May 6th, 2014. 2014-05-29: Core Security contacts the ICS-CERT for assistance in order to coordinate the disclosure of the advisory. 2014-05-29: ICS-CERT acknowledges Core Security e-mail, and asks for a technical description of the vulnerability. 2014-05-29: Core Security sends technical details to the ICS-CERT. 2014-06-05: ICS-CERT team notifies that they have contacted the vendor and that they will notify us once the vendor has validated the vulnerabilities. 2014-06-18: ICS-CERT team notifies that the vendor is working in a new release, expected to be released in September, and ask if Core Security is interested in validating Advantech's vulnerability fix in their beta version. 2014-06-18: Core Security accepts the testing of the vendor beta version, but shares their concerns about waiting several months for fixes that are related to vulnerabilities already public. 2014-06-18: ICS-CERT notifies that they will let us know when they plan to make the beta version available for testing. 2014-07-03: ICS-CERT team notifies that the vendor is working to provide a download link for the beta version. 2014-07-08: ICS-CERT team sends download link provided by the vendor. 2014-07-10: Core Security confirms to ICS-CERT that the new version it's still vulnerable, and comments that after some analysis the vulnerable function doesn't has changes. 2014-07-10: ICS-CERT notifies that they will let the vendor know that that the vulnerabilities still exist. And asks to setup a teleconference between Core Security, the CERT and the vendor. 2014-07-10: Core Security notifies the ICS-CERT that all interactions are made via email only. 2014-07-10: ICS-CERT notifies they provided the information to the vendor. 2014-07-21: Core Security notifies the ICS-CERT that Tipping Point Zero Day Initiative has released several advisories[2] affecting the vendor including some that appears to be related to the one we are coordinating. 2014-07-21: ICS-CERT notifies that some of those advisories where in coordination with them, and that after a review of the link shared by Core Security are related to ICSA-14-198-02 and don't appear to be related to the reported vulnerability. 2014-07-21: Core Security notifies that ZDI-14-243 and ZDI-14-244 appears to be directly related. 2014-07-21: ICS-CERT is trying to contact Advantech to get a status update and their current plan for vulnerability remediation. 2014-08-07: ICS-CERT notifies that they contacted the vendor and they are waiting for an status update. 2014-08-21: Core Security contacts ICS-CERT since no reply was received in the past two weeks. 2014-08-21: ICS-CERT notifies that vendor representative stated that they are currently training a new product manager and they have not yet responded to the vulnerabilities we are discussing. 2014-08-28: Core Security notifies the ICS-CERT that the advisory publication is going to be scheduled for Monday 1st of September. 2014-08-28: ICS-CERT acknowledges Core Security e-mail. 2014-08-28: Core Security re-schedules the advisory publication for Sep 2nd, 2014. 2014-09-02: Core Security found out that the vendor released a silent fix on 30th of July. 2014-09-02: Core Security releases the advisory CORE-2014-0005 tagged as user-release.
-
References
[1] http://webaccess.advantech.com/. [2] http://www.zerodayinitiative.com/advisories/published/. [3] http://support.microsoft.com/kb/2458544. [4] https://github.com/CoreSecurity/sentinel.
-
About CoreLabs
CoreLabs, the research center of Core Security, is charged with anticipating the future needs and requirements for information security technologies. We conduct our research in several important areas of computer security including system vulnerabilities, cyber attack planning and simulation, source code auditing, and cryptography. Our results include problem formalization, identification of vulnerabilities, novel solutions and prototypes for new technologies. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use at: http://corelabs.coresecurity.com.
-
About Core Security Technologies
Core Security Technologies enables organizations to get ahead of threats with security test and measurement solutions that continuously identify and demonstrate real-world exposures to their most critical assets. Our customers can gain real visibility into their security standing, real validation of their security controls, and real metrics to more effectively secure their organizations.
Core Security's software solutions build on over a decade of trusted research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups. Core Security Technologies can be reached at +1 (617) 399-6980 or on the Web at: http://www.coresecurity.com.
-
Disclaimer
The contents of this advisory are copyright (c) 2014 Core Security and (c) 2014 CoreLabs, and are licensed under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 (United States) License: http://creativecommons.org/licenses/by-nc-sa/3.0/us/
-
PGP/GPG Keys
This advisory has been signed with the GPG key of Core Security advisories team, which is available for download at
http://www.coresecurity.com/files/attachments/core_security_advisories.asc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201409-0440", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "webaccess", "scope": "eq", "trust": 3.0, "vendor": "advantech", "version": "7.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "advantech webaccess", "version": "7.2" } ], "sources": [ { "db": "IVD", "id": "d29073fe-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05421" }, { "db": "JVNDB", "id": "JVNDB-2014-004352" }, { "db": "CNNVD", "id": "CNNVD-201409-733" }, { "db": "NVD", "id": "CVE-2014-0986" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:advantech:advantech_webaccess", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-004352" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ricardo Narvaja", "sources": [ { "db": "BID", "id": "69531" } ], "trust": 0.3 }, "cve": "CVE-2014-0986", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2014-0986", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2014-05421", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "d29073fe-2351-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-68479", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-0986", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2014-0986", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2014-05421", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201409-733", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "d29073fe-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-68479", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "d29073fe-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05421" }, { "db": "VULHUB", "id": "VHN-68479" }, { "db": "JVNDB", "id": "JVNDB-2014-004352" }, { "db": "CNNVD", "id": "CNNVD-201409-733" }, { "db": "NVD", "id": "CVE-2014-0986" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter. Advantech WebAccess is an IE-based HMI/SCADA monitoring software featuring all engineering projects, database setup, drawing and software management using standard browsers over the internet or intranet. A buffer overflow vulnerability exists in Advantech WebAccess. An attacker exploits a vulnerability to execute arbitrary code in the context of an affected application or to crash the entire application. Advantech WebAccess is prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Failed exploit attempts will likely cause a denial-of-service condition. \nAdvantech WebAccess 7.2 is vulnerable; other versions may also be affected. Advantech WebAccess is a browser-based HMI/SCADA software developed by Advantech. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. Core Security - Corelabs Advisory\nhttp://corelabs.coresecurity.com/\n\nAdvantech WebAccess Vulnerabilities\n\n\n1. *Advisory Information*\n\n Title: Advantech WebAccess Vulnerabilities\n Advisory ID: CORE-2014-0005\n Advisory URL:\nhttp://www.coresecurity.com/advisories/advantech-webaccess-vulnerabilities\n Date published: 2014-09-02\n Date of last update: 2014-09-01\n Vendors contacted: Advantech\n Release mode: User release\n\n\n2. *Vulnerability Description*\n\n Advantech WebAccess [1] is a browser-based\n software package for human-machine interfaces HMI, and supervisory\n control and data acquisition SCADA. \n\n\n4. WebAccess 7.2\n . \n\n\n5. *Non-vulnerable packages*\n\n . AdvantechWebAccessUSANode_20140730_3.4.3\n\n\n6. *Vendor Information, Solutions and Workarounds*\n\n Advantech has addressed the vulnerability in WebAccess by issuing an\nupdate located at\n http://webaccess.advantech.com/downloads_software.php\n\n Given that this is a client-side vulnerability, affected users\nshould avoid\n opening untrusted \u0027.html\u0027 files. \n Core Security also recommends those affected use third party\nsoftware such as\n Sentinel [4] or EMET [3]\n that could help to prevent the exploitation of affected systems to\nsome extent. \n\n\n7. *Credits*\n\n This vulnerability was discovered and researched by Ricardo Narvaja\nfrom\n Core Security Exploit Writers Team. \n \n Core Security Advisories Team would also like to thank ICS-CERT\nCoordination Center\n for their assistance during the vulnerability reporting process. \n \n\n8. \n\n Below is shown the result of opening a malicious html file with a long\n NodeName parameter, an attacker can overflow the stack buffer mentioned\n above and overwrite the SEH (Structured Exception Handler), enabling\n arbitrary code execution on the machine. \n\n/-----\n \nEAX 03A39942 ASCII \"BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB...\"\nECX 0162B720\nEDX 01630000 xpsp2res.01630000\nEBX 0162B720\nESP 0162B454\nEBP 0162B460\nESI 0162B4D8\nEDI 03A31E98\nEIP 064EA6D4 webvact.064EA6D4\n\n-----/\n\n\n/-----\n \nSEH chain of thread 000016CC\nAddress SE handler\n0162DB40 42424242\n\n-----/\n\n\n9. *Report Timeline*\n . 2014-05-06: Core Security notifies Advantech of the vulnerability. \nPublication date is set for May 26th, 2014. 2014-05-09: CORE asks for a reply. 2014-05-26: First release date missed. 2014-05-26: Core Security notifies that the issues were reported 2\nweeks ago and there was no reply since May 6th, 2014. 2014-05-29: Core Security contacts the ICS-CERT for assistance in\norder to coordinate the disclosure of the advisory. 2014-05-29: ICS-CERT acknowledges Core Security e-mail, and asks\nfor a technical description of the vulnerability. 2014-05-29: Core Security sends technical details to the ICS-CERT. 2014-06-05: ICS-CERT team notifies that they have contacted the\nvendor and that they will notify us once the vendor has validated the\nvulnerabilities. 2014-06-18: ICS-CERT team notifies that the vendor is working in a\nnew release, expected to be released in September, and ask if Core\nSecurity is interested in validating Advantech\u0027s vulnerability fix in\ntheir beta version. 2014-06-18: Core Security accepts the testing of the vendor beta\nversion, but shares their concerns about waiting several months for\nfixes that are related to vulnerabilities already public. 2014-06-18: ICS-CERT notifies that they will let us know when they\nplan to make the beta version available for testing. 2014-07-03: ICS-CERT team notifies that the vendor is working to\nprovide a download link for the beta version. 2014-07-08: ICS-CERT team sends download link provided by the vendor. 2014-07-10: Core Security confirms to ICS-CERT that the new\nversion it\u0027s still vulnerable, and comments that after some analysis the\nvulnerable function doesn\u0027t has changes. 2014-07-10: ICS-CERT notifies that they will let the vendor know\nthat that the vulnerabilities still exist. And asks to setup a\nteleconference between Core Security, the CERT and the vendor. 2014-07-10: Core Security notifies the ICS-CERT that all\ninteractions are made via email only. 2014-07-10: ICS-CERT notifies they provided the information to the\nvendor. 2014-07-21: Core Security notifies the ICS-CERT that Tipping Point\nZero Day Initiative has released several advisories[2] affecting the\nvendor including some that appears to be related to the one we are\ncoordinating. 2014-07-21: ICS-CERT notifies that some of those advisories where\nin coordination with them, and that after a review of the link shared by\nCore Security are related to ICSA-14-198-02 and don\u0027t appear to be\nrelated to the reported vulnerability. 2014-07-21: Core Security notifies that ZDI-14-243 and ZDI-14-244\nappears to be directly related. 2014-07-21: ICS-CERT is trying to contact Advantech to get a\nstatus update and their current plan for vulnerability remediation. 2014-08-07: ICS-CERT notifies that they contacted the vendor and\nthey are waiting for an status update. 2014-08-21: Core Security contacts ICS-CERT since no reply was\nreceived in the past two weeks. 2014-08-21: ICS-CERT notifies that vendor representative stated\nthat they are currently training a new product manager and they have not\nyet responded to the vulnerabilities we are discussing. 2014-08-28: Core Security notifies the ICS-CERT that the advisory\npublication is going to be scheduled for Monday 1st of September. 2014-08-28: ICS-CERT acknowledges Core Security e-mail. 2014-08-28: Core Security re-schedules the advisory publication\nfor Sep 2nd, 2014. 2014-09-02: Core Security found out that the vendor released a\nsilent fix on 30th of July. 2014-09-02: Core Security releases the advisory CORE-2014-0005\ntagged as user-release. \n\n\n10. *References*\n\n [1] http://webaccess.advantech.com/. \n [2] http://www.zerodayinitiative.com/advisories/published/. \n [3] http://support.microsoft.com/kb/2458544. \n [4] https://github.com/CoreSecurity/sentinel. \n\n\n11. *About CoreLabs*\n\n CoreLabs, the research center of Core Security, is charged with\nanticipating\n the future needs and requirements for information security\ntechnologies. \n We conduct our research in several important areas of computer security\n including system vulnerabilities, cyber attack planning and simulation,\n source code auditing, and cryptography. Our results include problem\n formalization, identification of vulnerabilities, novel solutions and\n prototypes for new technologies. CoreLabs regularly publishes security\n advisories, technical papers, project information and shared software\n tools for public use at:\n http://corelabs.coresecurity.com. \n\n\n12. *About Core Security Technologies*\n\n Core Security Technologies enables organizations to get ahead of threats\n with security test and measurement solutions that continuously identify\n and demonstrate real-world exposures to their most critical assets. Our\n customers can gain real visibility into their security standing, real\n validation of their security controls, and real metrics to more\n effectively secure their organizations. \n\n Core Security\u0027s software solutions build on over a decade of trusted\n research and leading-edge threat expertise from the company\u0027s Security\n Consulting Services, CoreLabs and Engineering groups. Core Security\n Technologies can be reached at +1 (617) 399-6980 or on the Web at:\n http://www.coresecurity.com. \n\n\n13. *Disclaimer*\n\n The contents of this advisory are copyright\n (c) 2014 Core Security and (c) 2014 CoreLabs,\n and are licensed under a Creative Commons\n Attribution Non-Commercial Share-Alike 3.0 (United States) License:\n http://creativecommons.org/licenses/by-nc-sa/3.0/us/\n\n\n14. *PGP/GPG Keys*\n\n This advisory has been signed with the GPG key of Core Security\nadvisories\n team, which is available for download at\n \nhttp://www.coresecurity.com/files/attachments/core_security_advisories.asc", "sources": [ { "db": "NVD", "id": "CVE-2014-0986" }, { "db": "JVNDB", "id": "JVNDB-2014-004352" }, { "db": "CNVD", "id": "CNVD-2014-05421" }, { "db": "BID", "id": "69531" }, { "db": "IVD", "id": "d29073fe-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-68479" }, { "db": "PACKETSTORM", "id": "128120" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-0986", "trust": 3.7 }, { "db": "ICS CERT", "id": "ICSA-14-261-01", "trust": 3.4 }, { "db": "BID", "id": "69531", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-201409-733", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2014-05421", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-004352", "trust": 0.8 }, { "db": "CXSECURITY", "id": "WLB-2014090006", "trust": 0.6 }, { "db": "IVD", "id": "D29073FE-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-68479", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128120", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "d29073fe-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05421" }, { "db": "VULHUB", "id": "VHN-68479" }, { "db": "BID", "id": "69531" }, { "db": "JVNDB", "id": "JVNDB-2014-004352" }, { "db": "PACKETSTORM", "id": "128120" }, { "db": "CNNVD", "id": "CNNVD-201409-733" }, { "db": "NVD", "id": "CVE-2014-0986" } ] }, "id": "VAR-201409-0440", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "d29073fe-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05421" }, { "db": "VULHUB", "id": "VHN-68479" } ], "trust": 1.33470696 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "d29073fe-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05421" } ] }, "last_update_date": "2024-11-23T22:38:56.211000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advantech WebAccess", "trust": 0.8, "url": "http://www.advantech.co.jp/products/GF-1M94V/Advantech-WebAccess/mod_B975C492-56B3-4EBA-8BBB-5B6D3483EE9D.aspx" }, { "title": "Patch for Advantech WebAccess Buffer Overflow Vulnerability (CNVD-2014-05421)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/53291" }, { "title": "AdvantechWebAccessUSANode_20140730_3.4.3", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51645" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-05421" }, { "db": "JVNDB", "id": "JVNDB-2014-004352" }, { "db": "CNNVD", "id": "CNNVD-201409-733" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-68479" }, { "db": "JVNDB", "id": "JVNDB-2014-004352" }, { "db": "NVD", "id": "CVE-2014-0986" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-14-261-01" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/69531" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0986" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0986" }, { "trust": 0.6, "url": "http://cxsecurity.com/issue/wlb-2014090006" }, { "trust": 0.4, "url": "http://www.coresecurity.com/advisories/advantech-webaccess-vulnerabilities" }, { "trust": 0.3, "url": "http://webaccess.advantech.com" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0987" }, { "trust": 0.1, "url": "http://corelabs.coresecurity.com/" }, { "trust": 0.1, "url": "http://webaccess.advantech.com/." }, { "trust": 0.1, "url": "http://www.coresecurity.com." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0988" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com/advisories/published/." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0992" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-nc-sa/3.0/us/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0989" }, { "trust": 0.1, "url": "https://github.com/coresecurity/sentinel." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0991" }, { "trust": 0.1, "url": "http://www.coresecurity.com/files/attachments/core_security_advisories.asc." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0990" }, { "trust": 0.1, "url": "http://corelabs.coresecurity.com." }, { "trust": 0.1, "url": "http://webaccess.advantech.com/downloads_software.php" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0986" }, { "trust": 0.1, "url": "http://support.microsoft.com/kb/2458544." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0985" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-05421" }, { "db": "VULHUB", "id": "VHN-68479" }, { "db": "BID", "id": "69531" }, { "db": "JVNDB", "id": "JVNDB-2014-004352" }, { "db": "PACKETSTORM", "id": "128120" }, { "db": "CNNVD", "id": "CNNVD-201409-733" }, { "db": "NVD", "id": "CVE-2014-0986" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "d29073fe-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05421" }, { "db": "VULHUB", "id": "VHN-68479" }, { "db": "BID", "id": "69531" }, { "db": "JVNDB", "id": "JVNDB-2014-004352" }, { "db": "PACKETSTORM", "id": "128120" }, { "db": "CNNVD", "id": "CNNVD-201409-733" }, { "db": "NVD", "id": "CVE-2014-0986" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-09-05T00:00:00", "db": "IVD", "id": "d29073fe-2351-11e6-abef-000c29c66e3d" }, { "date": "2014-09-05T00:00:00", "db": "CNVD", "id": "CNVD-2014-05421" }, { "date": "2014-09-20T00:00:00", "db": "VULHUB", "id": "VHN-68479" }, { "date": "2014-09-02T00:00:00", "db": "BID", "id": "69531" }, { "date": "2014-09-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004352" }, { "date": "2014-09-02T22:28:11", "db": "PACKETSTORM", "id": "128120" }, { "date": "2014-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201409-733" }, { "date": "2014-09-20T10:55:03.997000", "db": "NVD", "id": "CVE-2014-0986" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-12-29T00:00:00", "db": "CNVD", "id": "CNVD-2014-05421" }, { "date": "2015-08-05T00:00:00", "db": "VULHUB", "id": "VHN-68479" }, { "date": "2014-09-22T18:05:00", "db": "BID", "id": "69531" }, { "date": "2014-09-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004352" }, { "date": "2014-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201409-733" }, { "date": "2024-11-21T02:03:09.863000", "db": "NVD", "id": "CVE-2014-0986" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201409-733" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advantech WebAccess Vulnerable to stack-based buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-004352" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "d29073fe-2351-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201409-733" } ], "trust": 0.8 } }
ghsa-m5vp-j5fx-mgc4
Vulnerability from github
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.
{ "affected": [], "aliases": [ "CVE-2014-0986" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-09-20T10:55:00Z", "severity": "MODERATE" }, "details": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.", "id": "GHSA-m5vp-j5fx-mgc4", "modified": "2022-05-17T04:10:20Z", "published": "2022-05-17T04:10:20Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0986" }, { "type": "WEB", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/69531" } ], "schema_version": "1.4.0", "severity": [] }
icsa-14-261-01
Vulnerability from csaf_cisa
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-14-261-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2014/icsa-14-261-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-14-261-01 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-261-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" } ], "title": "Advantech WebAccess Vulnerabilities", "tracking": { "current_release_date": "2025-06-06T22:48:58.295004Z", "generator": { "date": "2025-06-06T22:48:58.294941Z", "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-14-261-01", "initial_release_date": "2014-06-21T06:00:00.000000Z", "revision_history": [ { "date": "2014-06-21T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" }, { "date": "2025-06-06T22:48:58.295004Z", "legacy_version": "CSAF Conversion", "number": "2", "summary": "Advisory converted into a CSAF" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "7.2", "product": { "name": "Advantech WebAccess: 7.2", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "WebAccess" } ], "category": "vendor", "name": "Advantech" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-0985", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName parameter.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Advantech has created a patch (AdvantechWebAccessUSANode_20140730_3.4.3.exe) that mitigates each of the vulnerabilities described above. Users may download the patch from the following location at Advantech\u2019s web site (http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe)", "product_ids": [ "CSAFPID-0001" ], "url": "http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe" } ], "scores": [ { "cvss_v2": { "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2014-0986", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Advantech has created a patch (AdvantechWebAccessUSANode_20140730_3.4.3.exe) that mitigates each of the vulnerabilities described above. Users may download the patch from the following location at Advantech\u2019s web site (http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe)", "product_ids": [ "CSAFPID-0001" ], "url": "http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe" } ], "scores": [ { "cvss_v2": { "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2014-0987", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName2 parameter.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Advantech has created a patch (AdvantechWebAccessUSANode_20140730_3.4.3.exe) that mitigates each of the vulnerabilities described above. Users may download the patch from the following location at Advantech\u2019s web site (http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe)", "product_ids": [ "CSAFPID-0001" ], "url": "http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe" } ], "scores": [ { "cvss_v2": { "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2014-0988", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode parameter.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Advantech has created a patch (AdvantechWebAccessUSANode_20140730_3.4.3.exe) that mitigates each of the vulnerabilities described above. Users may download the patch from the following location at Advantech\u2019s web site (http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe)", "product_ids": [ "CSAFPID-0001" ], "url": "http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe" } ], "scores": [ { "cvss_v2": { "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2014-0989", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode2 parameter.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Advantech has created a patch (AdvantechWebAccessUSANode_20140730_3.4.3.exe) that mitigates each of the vulnerabilities described above. Users may download the patch from the following location at Advantech\u2019s web site (http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe)", "product_ids": [ "CSAFPID-0001" ], "url": "http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe" } ], "scores": [ { "cvss_v2": { "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2014-0990", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the UserName parameter.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Advantech has created a patch (AdvantechWebAccessUSANode_20140730_3.4.3.exe) that mitigates each of the vulnerabilities described above. Users may download the patch from the following location at Advantech\u2019s web site (http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe)", "product_ids": [ "CSAFPID-0001" ], "url": "http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe" } ], "scores": [ { "cvss_v2": { "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2014-0991", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the projectname parameter.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Advantech has created a patch (AdvantechWebAccessUSANode_20140730_3.4.3.exe) that mitigates each of the vulnerabilities described above. Users may download the patch from the following location at Advantech\u2019s web site (http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe)", "product_ids": [ "CSAFPID-0001" ], "url": "http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe" } ], "scores": [ { "cvss_v2": { "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2014-0992", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the password parameter.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "Advantech has created a patch (AdvantechWebAccessUSANode_20140730_3.4.3.exe) that mitigates each of the vulnerabilities described above. Users may download the patch from the following location at Advantech\u2019s web site (http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe)", "product_ids": [ "CSAFPID-0001" ], "url": "http://advantech.vo.llnwd.net/o35/www/webaccess/webaccess7.2/AdvantechWebAccessUSANode_20140730_3.4.3.exe" } ], "scores": [ { "cvss_v2": { "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
gsd-2014-0986
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2014-0986", "description": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.", "id": "GSD-2014-0986" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-0986" ], "details": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.", "id": "GSD-2014-0986", "modified": "2023-12-13T01:22:44.734955Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-0986", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01" }, { "name": "69531", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69531" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:advantech:advantech_webaccess:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-0986" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01", "refsource": "MISC", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01" }, { "name": "69531", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/69531" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true } }, "lastModifiedDate": "2015-08-05T16:02Z", "publishedDate": "2014-09-20T10:55Z" } } }
fkie_cve-2014-0986
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/69531 | ||
cve@mitre.org | https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/69531 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
advantech | advantech_webaccess | 7.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:advantech:advantech_webaccess:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B96EC24-9006-4AEE-955A-9D0ACDEF284D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter." }, { "lang": "es", "value": "Desbordamiento de buffer basado en pila en Advantech WebAccess (antiguamente BroadWin WebAccess) 7.2 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro GotoCmd." } ], "id": "CVE-2014-0986", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-09-20T10:55:03.997", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/69531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-261-01" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.