CVE-2014-0765
12.04.2014, 04:37
To exploit this vulnerability, the attacker sends data from the GotoCmd argument to control. If the value of the argument is overly long, the static stack buffer can be overflowed. This will allow the attacker to execute arbitrary code remotely.Enginsight
Vendor | Product | Version |
---|---|---|
advantech | advantech_webaccess | 𝑥 ≤ 7.1 |
advantech | advantech_webaccess | 5.0 |
advantech | advantech_webaccess | 6.0 |
advantech | advantech_webaccess | 7.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-121 - Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory BufferThe software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.