First published: Fri Sep 17 2021(Updated: )
Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could lead to a stack-based buffer overflow while trying to copy to a buffer during font string handling. An attacker could leverage this vulnerability to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Deltaww Dopsoft | >=2.00<=2.00.07 | |
Delta Electronics DOPSoft 2: Version 2.00.07 and prior |
DOPSoft 2 will not receive an update to mitigate these vulnerabilities because it is an end-of-life product. Delta Electronics recommends users to switch to the replacement software when available
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Delta Electronic DOPSoft 2 is CVE-2021-38402.
The severity of CVE-2021-38402 is high, with a severity value of 7.8.
The affected software for CVE-2021-38402 is Delta Electronic DOPSoft 2 (Version 2.00.07 and prior).
CVE-2021-38402 could lead to a stack-based buffer overflow while handling specific project files, potentially allowing an attacker to execute arbitrary code.
Yes, it is recommended to update to version 2.00.08 or later of Delta Electronic DOPSoft 2 to fix the vulnerability.