First published: Fri May 19 2017(Updated: )
A Stack Buffer Overflow issue was discovered in 3S-Smart Software Solutions GmbH CODESYS Web Server. The following versions of CODESYS Web Server, part of the CODESYS WebVisu web browser visualization software, are affected: CODESYS Web Server Versions 2.3 and prior. A malicious user could overflow the stack buffer by providing overly long strings to functions that handle the XML. Because the function does not verify string size before copying to memory, the attacker may then be able to crash the application or run arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
CODESYS Web Server | <=2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6025 has a high severity rating due to its potential to allow remote code execution via stack buffer overflow.
To fix CVE-2017-6025, you should upgrade to a version of CODESYS Web Server that is later than 2.3.
CVE-2017-6025 affects all versions of CODESYS Web Server 2.3 and prior.
CVE-2017-6025 allows a malicious user to perform a stack buffer overflow attack on the CODESYS Web Server.
There are no known workarounds for CVE-2017-6025; the best course of action is to upgrade the affected software.