First published: Wed Mar 11 2020(Updated: )
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file.The destination buffer sp+0x440 is overflowed with the call to sprintf() for any type values that are greater than 1024-len(‘/etc/config-tools/config_interfaces interface=X1 state=enabled config-type=‘) in length. A type value of length 0x3d9 will cause the service to crash.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
WAGO PFC200 Firmware | =03.02.02\(14\) | |
WAGO PFC200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5182 is an exploitable stack buffer overflow vulnerability in the iocheckd service 'I/O-Check' functionality of WAGO PFC 200 Firmware version 03.02.02(14).
CVE-2019-5182 has a severity rating of 5.5, which is considered medium.
CVE-2019-5182 affects WAGO PFC 200 Firmware version 03.02.02(14).
CVE-2019-5182 can be exploited by sending a specially crafted packet to trigger the parsing of a cache file in the iocheckd service.
No, WAGO PFC200 is not vulnerable to CVE-2019-5182.