SB2021050714 - Multiple vulnerabilities in Delta Industrial Automation DOPSoft



SB2021050714 - Multiple vulnerabilities in Delta Industrial Automation DOPSoft

Published: May 7, 2021

Security Bulletin ID SB2021050714
Severity
Medium
Patch available
NO
Number of vulnerabilities 10
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Out-of-bounds read (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of DPA files. A remote attacker can create a specially crafted DPA file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


2) Out-of-bounds read (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of DPA files. A remote attacker can create a specially crafted DPA file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


3) Out-of-bounds read (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of DPA files. A remote attacker can create a specially crafted DPA file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


4) Out-of-bounds read (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of DPA files. A remote attacker can create a specially crafted DPA file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


5) Out-of-bounds read (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of DPA files. A remote attacker can create a specially crafted DPA file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


6) Out-of-bounds read (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of DPA files. A remote attacker can create a specially crafted DPA file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


7) Out-of-bounds read (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of DPA files. A remote attacker can create a specially crafted DPA file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


8) Out-of-bounds read (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of DPA files. A remote attacker can create a specially crafted DPA file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


9) Out-of-bounds read (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of DPA files. A remote attacker can create a specially crafted DPA file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


10) Out-of-bounds read (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the parsing of DPA files. A remote attacker can create a specially crafted DPA file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.