#VU71785 Stack-based buffer overflow in DIAScreen - CVE-2023-0250
Published: February 3, 2023 / Updated: May 2, 2023
DIAScreen
Delta Electronics, Inc.
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when parsing DPA files. A remote attacker can trick the victim to open a specially crafted file, trigger a stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- https://ics-cert.us-cert.gov/advisories/icsa-23-033-01
- https://www.zerodayinitiative.com/advisories/ZDI-23-505/
- https://www.zerodayinitiative.com/advisories/ZDI-23-504/
- https://www.zerodayinitiative.com/advisories/ZDI-23-519/
- https://www.zerodayinitiative.com/advisories/ZDI-23-517/
- https://www.zerodayinitiative.com/advisories/ZDI-23-516/
- https://www.zerodayinitiative.com/advisories/ZDI-23-515/
- https://www.zerodayinitiative.com/advisories/ZDI-23-512/
- https://www.zerodayinitiative.com/advisories/ZDI-23-510/
- https://www.zerodayinitiative.com/advisories/ZDI-23-509/
- https://www.zerodayinitiative.com/advisories/ZDI-23-508/
- https://www.zerodayinitiative.com/advisories/ZDI-23-507/
- https://www.zerodayinitiative.com/advisories/ZDI-23-506/