First published: Mon Feb 13 2017(Updated: )
An issue was discovered in Fatek Automation PLC WinProladder Version 3.11 Build 14701. A stack-based buffer overflow vulnerability exists when the software application connects to a malicious server, resulting in a stack buffer overflow. This causes an exploitable Structured Exception Handler (SEH) overwrite condition that may allow remote code execution.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Fatek WinProladder | =3.11-build_14701 | |
Fatek WinProladder |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8377 is rated as critical due to the potential for remote code execution through a stack-based buffer overflow.
To mitigate CVE-2016-8377, users should update to the latest version of WinProladder that resolves this vulnerability.
The impact of CVE-2016-8377 includes unauthorized access and execution of arbitrary code on the affected systems.
CVE-2016-8377 specifically affects Fatek Automation PLC WinProladder Version 3.11 Build 14701.
Exploitation of CVE-2016-8377 occurs when the software connects to a malicious server, leading to a stack buffer overflow.