CVE-2018-18994 – LAquis SCADA LQS File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-18994
LCDS Laquis SCADA prior to version 4.1.0.4150 allows an out of bounds read when opening a specially crafted project file, which may cause a system crash or allow data exfiltration. LCDS Laquis SCADA, en versiones anteriores a la 4.1.0.4150, permite una lectura fuera de límites al abrir un archivo de proyecto especialmente manipulado, lo que podría provocar un cierre inesperado del sistema o permitir la exfiltración de datos. This vulnerability allows remote attackers to execute arbitrary code User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of LQS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the process. • https://ics-cert.us-cert.gov/advisories/ICSA-19-015-01 • CWE-125: Out-of-bounds Read •
CVE-2018-17895 – LAquis SCADA lqs File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2018-17895
LAquis SCADA Versions 4.1.0.3870 and prior has several out-of-bounds read vulnerabilities, which may allow remote code execution. LAquis SCADA en versiones 4.1.0.3870 y anteriores tiene varias vulnerabilidades de lectura fuera de límites que podrían permitir la ejecución remota de código. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of LQS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read before an allocated buffer. • http://laquisscada.com/instale1.php http://www.securityfocus.com/bid/105719 https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 • CWE-125: Out-of-bounds Read •
CVE-2018-17901 – LAquis SCADA LQS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-17901
LAquis SCADA Versions 4.1.0.3870 and prior, when processing project files the application fails to sanitize user input prior to performing write operations on a stack object, which may allow an attacker to execute code under the current process. LAquis SCADA en versiones 4.1.0.3870 y anteriores, al procesar archivos de proyecto, no sanea las entradas del usuario antes de realizar operaciones de escritura en un objeto de la pila, lo que podría permitir que el atacante ejecute código en el proceso actual. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of LQS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. • http://laquisscada.com/instale1.php https://exchange.xforce.ibmcloud.com/vulnerabilities/151421 https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 • CWE-787: Out-of-bounds Write •
CVE-2018-17899 – LAquis SCADA LQS File Parsing Directory Traversal Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-17899
LAquis SCADA Versions 4.1.0.3870 and prior has a path traversal vulnerability, which may allow remote code execution. LAquis SCADA en versiones 4.1.0.3870 y anteriores tiene una vulnerabilidad de salto de directorio que podría permitir la ejecución remota de código. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. • http://laquisscada.com/instale1.php http://www.securityfocus.com/bid/105719 https://exchange.xforce.ibmcloud.com/vulnerabilities/151420 https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2018-17893 – LAquis SCADA LQS File Parsing Untrusted Pointer Dereference Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-17893
LAquis SCADA Versions 4.1.0.3870 and prior has an untrusted pointer dereference vulnerability, which may allow remote code execution. LAquis SCADA en versiones 4.1.0.3870 y anteriores tiene una vulnerabilidad de desreferencia de puntero no fiable que podría permitir la ejecución remota de código. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within parsing of LQS files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. • http://laquisscada.com/instale1.php http://www.securityfocus.com/bid/105719 https://exchange.xforce.ibmcloud.com/vulnerabilities/151417 https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 • CWE-476: NULL Pointer Dereference CWE-822: Untrusted Pointer Dereference •