SB2023020313 - Multiple vulnerabilities in Delta Electronics DIAScreen
Published: February 3, 2023 Updated: September 1, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2023-0250)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when parsing DPA files. A remote attacker can trick the victim to open a specially crafted file, trigger a stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Buffer overflow (CVE-ID: CVE-2023-0251)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when parsing DPA files. A remote attacker can trick the victim to open a specially crafted file, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Out-of-bounds write (CVE-ID: CVE-2023-0249)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when parsing DPA files. A remote attacker can trick the victim to open a specially crafted file, trigger an out-of-bounds write and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.
References
- https://ics-cert.us-cert.gov/advisories/icsa-23-033-01
- https://www.zerodayinitiative.com/advisories/ZDI-23-505/
- https://www.zerodayinitiative.com/advisories/ZDI-23-504/
- https://www.zerodayinitiative.com/advisories/ZDI-23-519/
- https://www.zerodayinitiative.com/advisories/ZDI-23-517/
- https://www.zerodayinitiative.com/advisories/ZDI-23-516/
- https://www.zerodayinitiative.com/advisories/ZDI-23-515/
- https://www.zerodayinitiative.com/advisories/ZDI-23-512/
- https://www.zerodayinitiative.com/advisories/ZDI-23-510/
- https://www.zerodayinitiative.com/advisories/ZDI-23-509/
- https://www.zerodayinitiative.com/advisories/ZDI-23-508/
- https://www.zerodayinitiative.com/advisories/ZDI-23-507/
- https://www.zerodayinitiative.com/advisories/ZDI-23-506/
- https://www.zerodayinitiative.com/advisories/ZDI-23-518/
- https://www.zerodayinitiative.com/advisories/ZDI-23-514/
- https://www.zerodayinitiative.com/advisories/ZDI-23-511/
- https://www.zerodayinitiative.com/advisories/ZDI-23-1294/
- https://www.zerodayinitiative.com/advisories/ZDI-23-520/
- https://www.zerodayinitiative.com/advisories/ZDI-23-513/