CVE-2019-10947
Delta Industrial Automation CNCSoft ScreenEditor DPB File Parsing wKPFStringLen Stack-based Buffer Overflow Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Delta Industrial Automation CNCSoft, CNCSoft ScreenEditor Version 1.00.88 and prior. Multiple stack-based buffer overflow vulnerabilities may be exploited by processing specially crafted project files, allowing an attacker to remotely execute arbitrary code. This may occur because CNCSoft lacks user input validation before copying data from project files onto the stack.
Delta Industrial Automation CNCSoft, CNCSoft ScreenEditor versión 1.00.88 y anteriores. Se pueden aprovechar múltiples vulnerabilidades de desbordamiento de búfer en la región stack de la memoria al procesar archivos de proyecto especialmente creados, lo que permite a un atacante ejecutar código arbitrario de forma remota. Esto puede ocurrir porque CNCSoft carece de comprobación de entrada del usuario antes de copiar datos de los archivos del proyecto en la pila.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation CNCSoft ScreenEditor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of DPB files. When parsing the wKPFStringLen element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the Administrator.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-04-08 CVE Reserved
- 2019-04-17 CVE Published
- 2024-08-04 CVE Updated
- 2024-09-07 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-121: Stack-based Buffer Overflow
- CWE-787: Out-of-bounds Write
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/107989 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-399 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-400 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-401 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-402 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-403 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-404 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-410 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-417 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-19-106-01 | 2020-10-02 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Deltaww Search vendor "Deltaww" | Cncsoft Screeneditor Search vendor "Deltaww" for product "Cncsoft Screeneditor" | <= 1.00.88 Search vendor "Deltaww" for product "Cncsoft Screeneditor" and version " <= 1.00.88" | - |
Affected
|