#VU95785 Stack-based buffer overflow in DIAScreen - CVE-2024-7502
Published: August 12, 2024 / Updated: September 6, 2024
DIAScreen
Delta Electronics, Inc.
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote unauthenticated attacker can trick a victim to open a specially crafted DPA file, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-219-01
- https://www.zerodayinitiative.com/advisories/ZDI-24-1175/
- https://www.zerodayinitiative.com/advisories/ZDI-24-1174/
- https://www.zerodayinitiative.com/advisories/ZDI-24-1173/
- https://www.zerodayinitiative.com/advisories/ZDI-24-1172/
- https://www.zerodayinitiative.com/advisories/ZDI-24-1171/
- https://www.zerodayinitiative.com/advisories/ZDI-24-1170/
- https://www.zerodayinitiative.com/advisories/ZDI-24-1169/
- https://www.zerodayinitiative.com/advisories/ZDI-24-1168/
- https://www.zerodayinitiative.com/advisories/ZDI-24-1167/
- https://www.zerodayinitiative.com/advisories/ZDI-24-1166/
- https://www.zerodayinitiative.com/advisories/ZDI-24-1193/