First published: Thu Sep 21 2023(Updated: )
Delta Electronics DIAScreen may write past the end of an allocated buffer while parsing a specially crafted input file. This could allow an attacker to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Deltaww Diascreen | <1.3.2 | |
<1.3.2 |
Delta Electronics has released a new version (v1.3.2) of DIAScreen to address this issue. Users can download it at the download center of DIAStudio. https://diastudio.deltaww.com/home/downloads (Login required)
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-5068.
The severity level of CVE-2023-5068 is high.
This vulnerability allows an attacker to execute code in the context of the current process of Delta Electronics DIAScreen.
Versions up to and exclusive of 1.3.2 of Delta Electronics DIAScreen are affected by CVE-2023-5068.
To fix the vulnerability in Delta Electronics DIAScreen, update to a version beyond 1.3.2.