First published: Fri Apr 23 2021(Updated: )
Cscape (All versions prior to 9.90 SP4) lacks proper validation of user-supplied data when parsing project files. This could lead to memory corruption. An attacker could leverage this vulnerability to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Horner Automation Cscape | <9.90 | |
Horner Automation Cscape | =9.90 | |
Horner Automation Cscape | =9.90-sp1 | |
Horner Automation Cscape | =9.90-sp2 | |
Horner Automation Cscape | =9.90-sp3 | |
Horner Automation Cscape SP4 | <9.90 | 9.90 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22678 is a vulnerability in Cscape, all versions prior to 9.90 SP4, that lacks proper validation of user-supplied data when parsing project files, potentially leading to memory corruption and code execution.
CVE-2021-22678 has a severity rating of 7.8 (high).
All versions of Cscape prior to 9.90 SP4 are affected by CVE-2021-22678.
CVE-2021-22678 is classified under CWE-787 (Out-of-bounds Write) and CWE-20 (Improper Input Validation).
An attacker can leverage CVE-2021-22678 to execute code in the context of the current process by exploiting the lack of proper validation of user-supplied data when parsing project files.