Remote code execution in Fuji Electric V-Server

Published: 2017-07-12 12:07:24
Severity High
Patch available YES
Number of vulnerabilities 1
CVSSv2 7.4 (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
CVSSv3 8.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE ID CVE-2017-9639
CWE ID CWE-119
Exploitation vector Network
Public exploit Not available
Vulnerable software V-Server
Vulnerable software versions V-Server 3.3.17.0
V-Server 3.3.22.0
Vendor URL Fuji Electric
Advisory type Public

Security Advisory

1) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code.

The weakness exists due to boundary error. A remote attacker can send specially crafted file, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 4.0.1.
http://proself.hakko-elec.co.jp/proself/publicweb/publicweb.go/EKzkQAiIvMzAVF0Bg-FcEz9DkGitzZP0H8fRb...

External links

http://www.isssource.com/fuji-mitigates-electric-v-server-issue/

Back to List