CNVD-2018-08900

Vulnerability from cnvd - Published: 2018-05-04
VLAI Severity ?
Title
多款WECON产品缓冲区溢出漏洞
Description
WECON LeviStudio HMI Editor和PI Studio HMI Project Programmer都是中国维控科技(WECON Technologies)公司的人机界面编程软件。 WECON LeviStudio HMI Editor和PI Studio HMI Project Programmer 2017年11月11日之前版本中存在缓冲区溢出漏洞。远程攻击者可借助特制的文件执行代码。
Severity
Patch Name
多款WECON产品缓冲区溢出漏洞的补丁
Patch Description
WECON LeviStudio HMI Editor和PI Studio HMI Project Programmer都是中国维控科技(WECON Technologies)公司的人机界面编程软件。 WECON LeviStudio HMI Editor和PI Studio HMI Project Programmer 2017年11月11日之前版本中存在缓冲区溢出漏洞。远程攻击者可借助特制的文件执行代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页: http://www.we-con.com.cn/

Reference
https://ics-cert.us-cert.gov/advisories/ICSA-18-116-02 http://www.securityfocus.com/bid/104016
Impacted products
Name
['WECON LeviStudio HMI Editor <=1.8.29', 'WECON PI Studio HMI Project Programmer <=2017年11月11日']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "104016"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2018-7527"
    }
  },
  "description": "WECON LeviStudio HMI Editor\u548cPI Studio HMI Project Programmer\u90fd\u662f\u4e2d\u56fd\u7ef4\u63a7\u79d1\u6280\uff08WECON Technologies\uff09\u516c\u53f8\u7684\u4eba\u673a\u754c\u9762\u7f16\u7a0b\u8f6f\u4ef6\u3002\r\n\r\nWECON LeviStudio HMI Editor\u548cPI Studio HMI Project Programmer 2017\u5e7411\u670811\u65e5\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u6587\u4ef6\u6267\u884c\u4ee3\u7801\u3002",
  "discovererName": "Sergey Zelenyuk of RVRT and Michael DePlante of Leahy Center for Digital Investigation at Champlain College",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a\r\nhttp://www.we-con.com.cn/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2018-08900",
  "openTime": "2018-05-04",
  "patchDescription": "WECON LeviStudio HMI Editor\u548cPI Studio HMI Project Programmer\u90fd\u662f\u4e2d\u56fd\u7ef4\u63a7\u79d1\u6280\uff08WECON Technologies\uff09\u516c\u53f8\u7684\u4eba\u673a\u754c\u9762\u7f16\u7a0b\u8f6f\u4ef6\u3002\r\n\r\nWECON LeviStudio HMI Editor\u548cPI Studio HMI Project Programmer 2017\u5e7411\u670811\u65e5\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u6587\u4ef6\u6267\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eWECON\u4ea7\u54c1\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "WECON LeviStudio HMI Editor \u003c=1.8.29",
      "WECON PI Studio HMI Project Programmer \u003c=2017\u5e7411\u670811\u65e5"
    ]
  },
  "referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-18-116-02\r\nhttp://www.securityfocus.com/bid/104016",
  "serverity": "\u4e2d",
  "submitTime": "2018-04-28",
  "title": "\u591a\u6b3eWECON\u4ea7\u54c1\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…