SB2018022802 - Remote code execution in Delta Electronics WPLSoft
Published: February 28, 2018
Security Bulletin ID
SB2018022802
Severity
High
Patch available
YES
Number of vulnerabilities
3
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2018-7494)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists due to stack-based buffer overflow. A remote attacker can trick the victim into opening a specially crafted input, trigger memory corruption and cause the system crash or execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
2) Heap-based buffer overflow (CVE-ID: CVE-2018-7507)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists due to stack-based buffer overflow. A remote attacker can trick the victim into opening a specially crafted input, trigger memory corruption and cause the system crash or execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
3) Out-of-bounds write (CVE-ID: CVE-2018-7509)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists due to out-of-bounds write. A remote attacker can trick the victim into opening a specially crafted input, trigger memory corruption and cause the system crash or execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.