var-201708-1715
Vulnerability from variot
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within nvA1Media.ocx. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of the process.
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webaccess", "scope": null, "trust": 0.7, "vendor": "advantech", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-557" } ] }, "credits": { "_id": null, "data": "Anonymous", "sources": [ { "db": "ZDI", "id": "ZDI-17-557" } ], "trust": 0.7 }, "cvss": { "_id": null, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "ZDI-17-557", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "ZDI", "id": "ZDI-17-557", "trust": 0.7, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-557" } ] }, "description": { "_id": null, "data": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within nvA1Media.ocx. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of the process.", "sources": [ { "db": "ZDI", "id": "ZDI-17-557" } ], "trust": 0.7 }, "external_ids": { "_id": null, "data": [ { "db": "ZDI_CAN", "id": "ZDI-CAN-4105", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-17-557", "trust": 0.7 } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-557" } ] }, "id": "VAR-201708-1715", "iot": { "_id": null, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.41739574 }, "last_update_date": "2022-05-17T02:03:14.187000Z", "patch": { "_id": null, "data": [ { "title": "This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline.11/08/2016, 11/09/2016, 11/10/2016 and 11/15/2016 - ZDI disclosed the reports, 44 in all, to ICS-CERT11/09/2016 - The vendor acknowledged receipt of the report through ICS-CERT and ICS-CERT provided ICS-VU-71410304/27/2017 - ICS-CERT notified ZDI these might be fixed in the latest version and asked would ZDI re-test05/03/2017 - ZDI replied that we cannot do the testing for AdvantechICS-CERT did not respond06/23/2017 - ZDI wrote to ICS-CERT requesting any available update07/31/2017 - ZDI wrote to ICS-CERT requesting any available update08/01/2017 - ZDI wrote to ICS-CERT advising of the intent to 0-day-- Mitigation:The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Internet Explorer\\ActiveX Compatibility\\E19E79EC-F62E-40A0-952D-E49AEC7BEC2FIf the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser.For more information, please see: ", "trust": 0.7, "url": "http://support.microsoft.com/kb/240797" } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-557" } ] }, "references": { "_id": null, "data": [ { "trust": 0.7, "url": "http://support.microsoft.com/kb/240797" } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-557" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-17-557", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2017-08-07T00:00:00", "db": "ZDI", "id": "ZDI-17-557", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2017-08-07T00:00:00", "db": "ZDI", "id": "ZDI-17-557", "ident": null } ] }, "title": { "_id": null, "data": "(0Day) Advantech WebAccess nvA1Media Connect MediaPassword Stack-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-17-557" } ], "trust": 0.7 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.