Advantech WebAccess < 8.0.2015.08.16 Unspecified DLL String Handling Arbitrary Code Execution

medium Nessus Plugin ID 86899

Synopsis

The remote host has a web application running that is affected by an arbitrary code execution vulnerability.

Description

The Advantech WebAccess application running on the remote host is prior to version 8.0.2015.08.16. It is, therefore, affected by an arbitrary code execution vulnerability due to improper validation of user-supplied input when handling an unspecified DLL string in a file.
A local attacker can exploit this, via a specially crafted application, to cause a stack-based buffer overflow, resulting in the execution of arbitrary code or a denial of service condition.

Solution

Upgrade to Advantech WebAccess version 8.0.2015.08.16 or later.

See Also

https://ics-cert.us-cert.gov/advisories/ICSA-15-258-04

Plugin Details

Severity: Medium

ID: 86899

File Name: scada_advantech_webaccess_8_2015_0816.nbin

Version: 1.128

Type: remote

Family: SCADA

Published: 11/17/2015

Updated: 11/22/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.1

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:advantech:webaccess

Required KB Items: www/scada_advantech_webaccess

Exploit Ease: No known exploits are available

Patch Publication Date: 9/15/2015

Vulnerability Publication Date: 9/15/2015

Reference Information

CVE: CVE-2014-9202

BID: 76753

ICSA: 15-258-04