First published: Wed Mar 21 2018(Updated: )
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-based buffer overflow.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Omron CX-Supervisor | <=3.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Omron CX-Supervisor is CVE-2018-7513.
The severity of CVE-2018-7513 is medium (5.3).
CVE-2018-7513 is a stack-based buffer overflow vulnerability in Omron CX-Supervisor versions 3.30 and prior, which can be exploited by parsing malformed project files.
CVE-2018-7513 can be exploited by parsing malicious project files that are specially crafted to trigger a stack-based buffer overflow.
Yes, Omron has released a patch to address the vulnerability in CX-Supervisor.