CVE-2023-35127 – Fuji Electric Tellus Lite V-Simulator Stack-based Buffer Overflow
https://notcve.org/view.php?id=CVE-2023-35127
Stack-based buffer overflow may occur when Fuji Electric Tellus Lite V-Simulator parses a specially-crafted input file. Puede producirse un desbordamiento del búfer basado en pila cuando Fuji Electric Tellus Lite V-Simulator analiza un archivo de entrada especialmente manipulado. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of V9 files by the V-Simulator 6 module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. • https://felib.fujielectric.co.jp/en/M10009/M20034/document_detail/c27d5b69-68ef-4af5-90ee-b5dab118f71a https://www.cisa.gov/news-events/ics-advisories/icsa-23-325-02 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2023-40152 – Fuji Electric Tellus Lite V-Simulator Out-of-bounds Write
https://notcve.org/view.php?id=CVE-2023-40152
When Fuji Electric Tellus Lite V-Simulator parses a specially-crafted input file an out of bounds write may occur. Cuando Fuji Electric Tellus Lite V-Simulator analiza un archivo de entrada especialmente manipulado, puede producirse una escritura fuera de los límites. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of V9 files by the V-Simulator module. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. • https://felib.fujielectric.co.jp/en/M10009/M20034/document_detail/c27d5b69-68ef-4af5-90ee-b5dab118f71a https://www.cisa.gov/news-events/ics-advisories/icsa-23-325-02 • CWE-787: Out-of-bounds Write •
CVE-2023-5299 – Fuji Electric Tellus Lite V-Simulator Improper Access Control
https://notcve.org/view.php?id=CVE-2023-5299
A user with a standard account in Fuji Electric Tellus Lite may overwrite files in the system. Un usuario con una cuenta estándar en Fuji Electric Tellus Lite puede sobrescribir archivos en el sistema. This vulnerability allows local attackers to escalate privileges on affected installations of Fuji Electric Tellus Lite. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the product installer. The issue results from incorrect permissions set on product folders created by the installer. • https://felib.fujielectric.co.jp/en/M10009/M20034/document_detail/c27d5b69-68ef-4af5-90ee-b5dab118f71a https://www.cisa.gov/news-events/ics-advisories/icsa-23-325-02 • CWE-284: Improper Access Control •
CVE-2023-47583
https://notcve.org/view.php?id=CVE-2023-47583
Multiple out-of-bounds read vulnerabilities exist in TELLUS Simulator V4.0.17.0 and earlier. If a user opens a specially crafted file (X1 or V9 file), information may be disclosed and/or arbitrary code may be executed. Existen múltiples vulnerabilidades de lectura fuera de los límites en TELLUS Simulator V4.0.17.0 y versiones anteriores. Si un usuario abre un archivo especialmente manipulado (archivo X1 o V9), se puede revelar información y/o se puede ejecutar código arbitrario. • https://hakko-elec.co.jp/site/download/03tellus_inf/index.php https://jvn.jp/en/vu/JVNVU93840158 https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php • CWE-125: Out-of-bounds Read •
CVE-2023-47582
https://notcve.org/view.php?id=CVE-2023-47582
Access of uninitialized pointer vulnerability exists in TELLUS V4.0.17.0 and earlier and TELLUS Lite V4.0.17.0 and earlier. If a user opens a specially crafted file (X1, V8, or V9 file), information may be disclosed and/or arbitrary code may be executed. El acceso a la vulnerabilidad de puntero no inicializado existe en TELLUS V4.0.17.0 y anteriores y en TELLUS Lite V4.0.17.0 y anteriores. Si un usuario abre un archivo especialmente manipulado (archivo X1, V8 o V9), se puede revelar información y/o se puede ejecutar código arbitrario. • https://hakko-elec.co.jp/site/download/03tellus_inf/index.php https://jvn.jp/en/vu/JVNVU93840158 https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php • CWE-824: Access of Uninitialized Pointer •