cnvd-2018-08900
Vulnerability from cnvd
Title
多款WECON产品缓冲区溢出漏洞
Description
WECON LeviStudio HMI Editor和PI Studio HMI Project Programmer都是中国维控科技(WECON Technologies)公司的人机界面编程软件。 WECON LeviStudio HMI Editor和PI Studio HMI Project Programmer 2017年11月11日之前版本中存在缓冲区溢出漏洞。远程攻击者可借助特制的文件执行代码。
Severity
Patch Name
多款WECON产品缓冲区溢出漏洞的补丁
Patch Description
WECON LeviStudio HMI Editor和PI Studio HMI Project Programmer都是中国维控科技(WECON Technologies)公司的人机界面编程软件。 WECON LeviStudio HMI Editor和PI Studio HMI Project Programmer 2017年11月11日之前版本中存在缓冲区溢出漏洞。远程攻击者可借助特制的文件执行代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页: http://www.we-con.com.cn/

Reference
https://ics-cert.us-cert.gov/advisories/ICSA-18-116-02 http://www.securityfocus.com/bid/104016
Impacted products
Name
['WECON LeviStudio HMI Editor <=1.8.29', 'WECON PI Studio HMI Project Programmer <=2017年11月11日']
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "104016"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2018-7527"
    }
  },
  "description": "WECON LeviStudio HMI Editor\u548cPI Studio HMI Project Programmer\u90fd\u662f\u4e2d\u56fd\u7ef4\u63a7\u79d1\u6280\uff08WECON Technologies\uff09\u516c\u53f8\u7684\u4eba\u673a\u754c\u9762\u7f16\u7a0b\u8f6f\u4ef6\u3002\r\n\r\nWECON LeviStudio HMI Editor\u548cPI Studio HMI Project Programmer 2017\u5e7411\u670811\u65e5\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u6587\u4ef6\u6267\u884c\u4ee3\u7801\u3002",
  "discovererName": "Sergey Zelenyuk of RVRT and Michael DePlante of Leahy Center for Digital Investigation at Champlain College",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a\r\nhttp://www.we-con.com.cn/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2018-08900",
  "openTime": "2018-05-04",
  "patchDescription": "WECON LeviStudio HMI Editor\u548cPI Studio HMI Project Programmer\u90fd\u662f\u4e2d\u56fd\u7ef4\u63a7\u79d1\u6280\uff08WECON Technologies\uff09\u516c\u53f8\u7684\u4eba\u673a\u754c\u9762\u7f16\u7a0b\u8f6f\u4ef6\u3002\r\n\r\nWECON LeviStudio HMI Editor\u548cPI Studio HMI Project Programmer 2017\u5e7411\u670811\u65e5\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u6587\u4ef6\u6267\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eWECON\u4ea7\u54c1\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "WECON LeviStudio HMI Editor \u003c=1.8.29",
      "WECON PI Studio HMI Project Programmer \u003c=2017\u5e7411\u670811\u65e5"
    ]
  },
  "referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-18-116-02\r\nhttp://www.securityfocus.com/bid/104016",
  "serverity": "\u4e2d",
  "submitTime": "2018-04-28",
  "title": "\u591a\u6b3eWECON\u4ea7\u54c1\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…