FKIE_CVE-2022-3379

Vulnerability from fkie_nvd - Published: 2022-10-27 23:15 - Updated: 2024-11-21 07:19
Summary
Horner Automation's Cscape version 9.90 SP7 and prior does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by writing outside the memory buffer.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hornerautomation:cscape:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE2DC26D-983D-42DF-A903-1AFC1430EB07",
              "versionEndExcluding": "9.90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hornerautomation:cscape:9.90:-:*:*:*:*:*:*",
              "matchCriteriaId": "F3037FE7-0230-48F0-8665-3F63F4D57AFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hornerautomation:cscape:9.90:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "419F775A-9EC9-4C78-9834-D241D18E67AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hornerautomation:cscape:9.90:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "A20012C0-21A9-42BD-AF6A-CC193A3631FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hornerautomation:cscape:9.90:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "D62ADB7C-09CC-4A36-BD7C-235029100510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hornerautomation:cscape:9.90:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "35C25D54-A7DD-43D0-8A4C-EF274B8EAB65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hornerautomation:cscape:9.90:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "289190F6-E74B-4869-B47B-734A965A0C3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hornerautomation:cscape:9.90:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "B4EEABB9-4AD6-4F42-975D-5D4A50047EA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hornerautomation:cscape:9.90:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "DEB9CAB3-BB31-4344-88AE-E161776E7D4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "\nHorner Automation\u0027s Cscape version 9.90 SP7 and prior does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by writing outside the memory buffer.\n\n"
    },
    {
      "lang": "es",
      "value": "Horner Automation\u00b4s Cscape versi\u00f3n 9.90 SP 7 y anteriores no validan correctamente los datos proporcionados por el usuario. Si un usuario abre un archivo FNT formado con fines malintencionados, un atacante podr\u00eda ejecutar c\u00f3digo arbitrario dentro del proceso actual escribiendo fuera del B\u00fafer de memoria."
    }
  ],
  "id": "CVE-2022-3379",
  "lastModified": "2024-11-21T07:19:24.430",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "ics-cert@hq.dhs.gov",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-10-27T23:15:11.000",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-277-03"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-277-03"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…