First published: Mon Jun 19 2023(Updated: )
Stack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted SIM2 file may lead to information disclosure and/or arbitrary code execution. This vulnerability is different from CVE-2023-32538 and CVE-2023-32273.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Fujielectric Tellus | =4.0.15.0 | |
Fujielectric Tellus Lite | =4.0.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32201 is a stack-based buffer overflow vulnerability that exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0.
The severity of CVE-2023-32201 is high with a CVSS score of 7.8.
CVE-2023-32201 may lead to information disclosure and/or arbitrary code execution when opening a specially crafted SIM2 file in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0.
CVE-2023-32201 affects TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0.
To fix CVE-2023-32201, it is recommended to update to a secure version of TELLUS or TELLUS Lite provided by Fujielectric.