First published: Wed Mar 11 2020(Updated: )
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). The destination buffer sp+0x440 is overflowed with the call to sprintf() for any domainname values that are greater than 1024-len(‘/etc/config-tools/edit_dns_server domain-name=‘) in length. A domainname value of length 0x3fa will cause the service to crash.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
WAGO PFC200 Firmware | =03.02.02\(14\) | |
WAGO PFC200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-5177 is medium with a CVSS score of 5.5.
The affected software for CVE-2019-5177 is WAGO PFC 200 Firmware version 03.02.02(14).
CVE-2019-5177 affects WAGO PFC 200 Firmware version 03.02.02(14) by causing a stack buffer overflow vulnerability in the iocheckd service 'I/O-Check' functionality.
No, WAGO PFC200 is not vulnerable to CVE-2019-5177.
To fix CVE-2019-5177, it is recommended to update to a version of WAGO PFC 200 Firmware that is not affected by the vulnerability.