CVE-2014-0766
12.04.2014, 04:37
An attacker can exploit this vulnerability by copying an overly long NodeName2 argument into a statically sized buffer on the stack to overflow the static stack buffer. An attacker may use this vulnerability to remotely execute arbitrary code.Enginsight
Vendor | Product | Version |
---|---|---|
advantech | advantech_webaccess | 𝑥 ≤ 7.1 |
advantech | advantech_webaccess | 5.0 |
advantech | advantech_webaccess | 6.0 |
advantech | advantech_webaccess | 7.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-121 - Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory BufferThe software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.