First published: Wed Mar 11 2020(Updated: )
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can cause a stack buffer overflow, resulting in code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file. The destination buffer sp+0x440 is overflowed with the call to sprintf() for any subnetmask values that are greater than 1024-len(‘/etc/config-tools/config_interfaces interface=X1 state=enabled subnet-mask=‘) in length. A subnetmask value of length 0x3d9 will cause the service to crash.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
WAGO PFC200 Firmware | =03.02.02\(14\) | |
WAGO PFC200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5181 is a stack buffer overflow vulnerability in the iocheckd service 'I/O-Check' functionality of WAGO PFC 200 Firmware version 03.02.02(14).
CVE-2019-5181 has a severity score of 7.8, which is considered high.
CVE-2019-5181 occurs when a specially crafted XML cache file is written to a specific location on the device, causing a stack buffer overflow.
The affected software is WAGO PFC 200 Firmware version 03.02.02(14).
To fix CVE-2019-5181, users should update to a patched version of WAGO PFC 200 Firmware.