// For flags

CVE-2014-2364

Advantech WebAccess dvs.ocx ServerResponse Stack Buffer Overflow Remote Code Execution Vulnerability

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary code via a long string in the (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud, or (11) IPAddress parameter to an ActiveX control in (a) webvact.ocx, (b) dvs.ocx, or (c) webdact.ocx.

Múltiples desbordamientos de buffer basado en pila en Advantech WebAccess anterior a 7.2 permiten a atacantes remotos ejecutar código arbitrarios a través de una cadena larga en el parámetro (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud o (11) IPAddress en un control ActiveX en (a) webvact.ocx, (b) dvs.ocx o (c) webdact.ocx.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the DVC.DvcCtrl ActiveX Control in dvs.ocx. The control does not check the length of an attacker-supplied string in the ServerResponse method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process.

*Credits: Anonymous
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-03-13 CVE Reserved
  • 2014-07-18 CVE Published
  • 2014-09-24 First Exploit
  • 2024-08-06 CVE Updated
  • 2024-10-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Advantech
Search vendor "Advantech"
Advantech Webaccess
Search vendor "Advantech" for product "Advantech Webaccess"
<= 7.1
Search vendor "Advantech" for product "Advantech Webaccess" and version " <= 7.1"
-
Affected
Advantech
Search vendor "Advantech"
Advantech Webaccess
Search vendor "Advantech" for product "Advantech Webaccess"
5.0
Search vendor "Advantech" for product "Advantech Webaccess" and version "5.0"
-
Affected
Advantech
Search vendor "Advantech"
Advantech Webaccess
Search vendor "Advantech" for product "Advantech Webaccess"
6.0
Search vendor "Advantech" for product "Advantech Webaccess" and version "6.0"
-
Affected
Advantech
Search vendor "Advantech"
Advantech Webaccess
Search vendor "Advantech" for product "Advantech Webaccess"
7.0
Search vendor "Advantech" for product "Advantech Webaccess" and version "7.0"
-
Affected