Facebook Google Plus Twitter LinkedIn YouTube RSS Menú Buscar Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Advantech WebAccess 7.2 < 7.2-2014.07.30 Multiple ActiveX RCE

High

Synopsis

The detected version of Advantech WebAccess may be affected by multiple ActiveX Remote Code Execution (RCE) attack vectors.

Description

The installed version of Advantech WebAccess 7.2 is prior to 7.2-2014.07.30 and is affected by the following vulnerabilities :

- An overflow condition exists in the 'webvact.ocx' ActiveX control due to improper validation of user-supplied input when handling the 'NodeName' parameter. A remote, unauthenticated attacker can exploit this to cause a stack-based buffer overflow, potentially allowing the execution of arbitrary code. (CVE-2014-0985) - An overflow condition exists in the 'webvact.ocx' ActiveX control due to improper validation of user-supplied input when handling the 'GotoCmd' parameter. A remote, unauthenticated attacker can exploit this to cause a stack-based buffer overflow, potentially allowing the execution of arbitrary code. (CVE-2014-0986) - An overflow condition exists in the 'webvact.ocx' ActiveX control due to improper validation of user-supplied input when handling the 'NodeName2' parameter. A remote, unauthenticated attacker can exploit this to cause a stack-based buffer overflow, potentially allowing the execution of arbitrary code. (CVE-2014-0987) - An overflow condition exists in the 'webvact.ocx' ActiveX control due to improper validation of user-supplied input when handling the 'AccessCode' parameter. A remote, unauthenticated attacker can exploit this to cause a stack-based buffer overflow, potentially allowing the execution of arbitrary code. (CVE-2014-0988) - An overflow condition exists in the 'webvact.ocx' ActiveX control due to improper validation of user-supplied input when handling the 'AccessCode2' parameter. A remote, unauthenticated attacker can exploit this to cause a stack-based buffer overflow, potentially allowing the execution of arbitrary code. (CVE-2014-0989) - An overflow condition exists in the 'webvact.ocx' ActiveX control due to improper validation of user-supplied input when handling the 'UserName' parameter. A remote, unauthenticated attacker can exploit this to cause a stack-based buffer overflow, potentially allowing the execution of arbitrary code. (CVE-2014-0990) - An overflow condition exists in an unspecified ActiveX control due to improper validation of user-supplied input when handling the 'projectname' parameter. A remote, unauthenticated attacker can exploit this to cause a stack-based buffer overflow, potentially allowing the execution of arbitrary code. (CVE-2014-0991) - An overflow condition exists in an unspecified ActiveX control due to improper validation of user-supplied input when handling the 'password' parameter. A remote, unauthenticated attacker can exploit this to cause a stack-based buffer overflow, potentially allowing the execution of arbitrary code. (CVE-2014-0992)

Soluciones

Upgrade to Advantech WebAccess version 7.2-2014.07.30 or later.