First published: Mon Jun 19 2023(Updated: )
Stack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted V8 file may lead to information disclosure and/or arbitrary code execution.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Fujielectric Tellus | =4.0.15.0 | |
Fujielectric Tellus Lite | =4.0.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-32276 is high (7.8).
CVE-2023-32276 affects TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0.
CVE-2023-32276 may lead to information disclosure and/or arbitrary code execution.
To fix CVE-2023-32276, users should update to a patched version of TELLUS or TELLUS Lite.
More information about CVE-2023-32276 can be found at the following references: [Link 1](https://jvn.jp/en/vu/JVNVU98818508/), [Link 2](https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php).