First published: Mon Jun 19 2023(Updated: )
Stack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted SIM2 file may lead to information disclosure and/or arbitrary code execution. This vulnerability is different from CVE-2023-32538 and CVE-2023-32201.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Fujielectric Tellus | =4.0.15.0 | |
Fujielectric Tellus Lite | =4.0.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32273 is a stack-based buffer overflow vulnerability that exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0.
CVE-2023-32273 may lead to information disclosure and/or arbitrary code execution.
CVE-2023-32273 can be exploited by opening a specially crafted SIM2 file.
CVE-2023-32273 affects TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0.
It is recommended to update TELLUS and TELLUS Lite to a version that is not affected by CVE-2023-32273.