First published: Tue Dec 04 2018(Updated: )
Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Omron CX-One | <=4.42 | |
Omron CX-Programmer | <=9.66 | |
Omron Cx-server | <=5.0.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for these buffer overflow vulnerabilities is CVE-2018-18993.
CX-One Versions 4.42 and prior are affected by these vulnerabilities.
CX-Programmer Versions 9.66 and prior are affected by these vulnerabilities.
CX-Server Versions 5.0.23 and prior are affected by these vulnerabilities.
The severity of CVE-2018-18993 is high with a CVSS score of 7.8.