This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation CNCSoft ScreenEditor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of DPB files. When parsing the wMessageLen element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the Administrator.
Affected Software | Affected Version | How to fix |
---|---|---|
Delta Electronics Industrial Automation CNCSoft ScreenEditor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-19-403 is critical due to its ability to allow remote code execution.
To fix ZDI-19-403, users should update Delta Industrial Automation CNCSoft ScreenEditor to the latest version that includes security patches.
ZDI-19-403 can be exploited through malicious web pages or files that require user interaction to trigger the vulnerability.
ZDI-19-403 affects installations of Delta Industrial Automation CNCSoft ScreenEditor that have not been updated to the latest security version.
Exploitation of ZDI-19-403 requires the user to visit a malicious webpage or open a malicious file which contains the exploit.