CVE-2014-2364
Advantech WebAccess dvs.ocx ServerResponse Stack Buffer Overflow Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary code via a long string in the (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud, or (11) IPAddress parameter to an ActiveX control in (a) webvact.ocx, (b) dvs.ocx, or (c) webdact.ocx.
Múltiples desbordamientos de buffer basado en pila en Advantech WebAccess anterior a 7.2 permiten a atacantes remotos ejecutar código arbitrarios a través de una cadena larga en el parámetro (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud o (11) IPAddress en un control ActiveX en (a) webvact.ocx, (b) dvs.ocx o (c) webdact.ocx.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the DVC.DvcCtrl ActiveX Control in dvs.ocx. The control does not check the length of an attacker-supplied string in the ServerResponse method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-03-13 CVE Reserved
- 2014-07-18 CVE Published
- 2014-09-24 First Exploit
- 2024-08-06 CVE Updated
- 2024-10-22 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://ics-cert.us-cert.gov/advisories/ICSA-14-198-02 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/34757 | 2014-09-24 | |
http://packetstormsecurity.com/files/128384/Advantech-WebAccess-dvs.ocx-GetColor-Buffer-Overflow.html | 2024-08-06 | |
http://www.securityfocus.com/bid/68714 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Advantech Search vendor "Advantech" | Advantech Webaccess Search vendor "Advantech" for product "Advantech Webaccess" | <= 7.1 Search vendor "Advantech" for product "Advantech Webaccess" and version " <= 7.1" | - |
Affected
| ||||||
Advantech Search vendor "Advantech" | Advantech Webaccess Search vendor "Advantech" for product "Advantech Webaccess" | 5.0 Search vendor "Advantech" for product "Advantech Webaccess" and version "5.0" | - |
Affected
| ||||||
Advantech Search vendor "Advantech" | Advantech Webaccess Search vendor "Advantech" for product "Advantech Webaccess" | 6.0 Search vendor "Advantech" for product "Advantech Webaccess" and version "6.0" | - |
Affected
| ||||||
Advantech Search vendor "Advantech" | Advantech Webaccess Search vendor "Advantech" for product "Advantech Webaccess" | 7.0 Search vendor "Advantech" for product "Advantech Webaccess" and version "7.0" | - |
Affected
|