Published on February 20th, 2020 📆 | 2465 Views ⚑
0(0Day) WECON LeviStudioU G_bmp szFilename Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVE ID | |
CVSS SCORE | |
AFFECTED VENDORS | |
AFFECTED PRODUCTS |
LeviStudioU |
VULNERABILITY DETAILS |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Wecon LeviStudioU. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XML files. When parsing the szFilename attribute of the G_bmp element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of an administrator. |
ADDITIONAL DETAILS |
This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline. 09/27/19 - ZDI provided the vulnerability report to ICS-CERT -- Mitigation:
|
DISCLOSURE TIMELINE |
|
CREDIT | Natnael Samson (@NattiSamson) |
Gloss