CVE-2018-3991
https://notcve.org/view.php?id=CVE-2018-3991
An exploitable heap overflow vulnerability exists in the WkbProgramLow function of WibuKey Network server management, version 6.40.2402.500. A specially crafted TCP packet can cause a heap overflow, potentially leading to remote code execution. An attacker can send a malformed TCP packet to trigger this vulnerability. Existe una vulnerabilidad de desbordamiento de memoria dinámica (heap) explotable en la función WkbProgramLow de WibuKey Network server management en su versión 6.40.2402.500. Un paquete TCP especialmente manipulado puede provocar un desbordamiento de memoria dinámica (heap), lo que podría dar lugar a la ejecución remota de código. • http://www.securityfocus.com/bid/107005 https://cert-portal.siemens.com/productcert/pdf/ssa-760124.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-844562.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf https://talosintelligence.com/vulnerability_reports/TALOS-2018-0659 • CWE-787: Out-of-bounds Write •
CVE-2018-3990
https://notcve.org/view.php?id=CVE-2018-3990
An exploitable pool corruption vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400). A specially crafted IRP request can cause a buffer overflow, resulting in kernel memory corruption and, potentially, privilege escalation. An attacker can send an IRP request to trigger this vulnerability. Existe una vulnerabilidad de corrupción de pool explotable en la funcionalidad del gestor IOCTL 0x8200E804 de WibuKey.sys de WIBI-SYSTEMS en su versión 6.40 (en el build 2400). Una petición IRP especialmente manipulada puede provocar un desbordamiento de búfer, conduciendo a la corrupción de memoria y, potencialmente, al escalado de privilegios. • http://www.securityfocus.com/bid/107005 https://cert-portal.siemens.com/productcert/pdf/ssa-760124.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-844562.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf https://talosintelligence.com/vulnerability_reports/TALOS-2018-0658 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2018-3989
https://notcve.org/view.php?id=CVE-2018-3989
An exploitable kernel memory disclosure vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400).A specially crafted IRP request can cause the driver to return uninitialized memory, resulting in kernel memory disclosure. An attacker can send an IRP request to trigger this vulnerability. Existe una vulnerabilidad de exposición de memoria del kernel explotable en la funcionalidad del gestor IOCTL 0x8200E804 de WibuKey.sys de WIBI-SYSTEMS, en su versión 6.40 (en el build 2400). Una petición IRP especialmente manipulada puede causar que el controlador devuelva memoria no inicializada, conduciendo a una exposición de la memoria del kernel. Un atacante puede enviar una petición IRP para provocar esta vulnerabilidad. • http://www.securityfocus.com/bid/107005 https://cert-portal.siemens.com/productcert/pdf/ssa-760124.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-844562.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf https://talosintelligence.com/vulnerability_reports/TALOS-2018-0657 • CWE-908: Use of Uninitialized Resource •
CVE-2017-13754 – CodeMeter 6.50 - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2017-13754
Cross-site scripting (XSS) vulnerability in the "advanced settings - time server" module in Wibu-Systems CodeMeter before 6.50b allows remote attackers to inject arbitrary web script or HTML via the "server name" field in actions/ChangeConfiguration.html. Una vulnerabilidad de tipo Cross-Site Scripting (XSS) en el módulo "advanced settings - time server" en Wibu-Systems CodeMeter en versiones anteriores a la 6.50b permite que atacantes remotos inyecten scripts web o HTML arbitrarios mediante el campo "server name" en actions/ChangeConfiguration.html. • https://www.exploit-db.com/exploits/42610 http://seclists.org/fulldisclosure/2017/Sep/1 http://www.securityfocus.com/archive/1/541119/100/0/threaded http://www.securityfocus.com/bid/104433 https://ics-cert.us-cert.gov/advisories/ICSA-18-102-02 https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1073133 https://www.vulnerability-lab.com/get_content.php?id=2074 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2014-8419
https://notcve.org/view.php?id=CVE-2014-8419
Wibu-Systems CodeMeter Runtime before 5.20 uses weak permissions (read and write access for all users) for codemeter.exe, which allows local users to gain privileges via a Trojan horse file. Wibu-Systems CodeMeter Runtime anterior a 5.20 utiliza permisos débiles (acceso de lectura y escritura para todos los usuarios) para codemeter.exe, lo que permite a usuarios locales ganar privilegios a través de un fichero troyano. • http://packetstormsecurity.com/files/129234/CodeMeter-Weak-Service-Permissions.html http://www.securityfocus.com/archive/1/534079/100/0/threaded • CWE-264: Permissions, Privileges, and Access Controls •