Vulnerabilites related to we-con - pi_studio_hmi_project_programmer
cve-2018-7527
Vulnerability from cvelistv5
Published
2018-04-26 20:00
Modified
2024-09-16 23:46
Severity ?
EPSS score ?
Summary
A buffer overflow can be triggered in LeviStudio HMI Editor, Version 1.10 part of Wecon LeviStudioU 1.8.29, and PI Studio HMI Project Programmer, Build: November 11, 2017 and prior by opening a specially crafted file.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104016 | vdb-entry, x_refsource_BID | |
https://ics-cert.us-cert.gov/advisories/ICSA-18-116-02 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | WECON Technology Co., Ltd. | LeviStudio HMI Editor |
Version: Version 1.10 part of Wecon LeviStudioU 1.8.29 and prior |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T06:31:04.389Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "104016", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104016", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-116-02", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LeviStudio HMI Editor", vendor: "WECON Technology Co., Ltd.", versions: [ { status: "affected", version: "Version 1.10 part of Wecon LeviStudioU 1.8.29 and prior", }, ], }, { product: "PI Studio HMI Project Programmer", vendor: "WECON Technology Co., Ltd.", versions: [ { status: "affected", version: "Build: November 11, 2017 and prior", }, ], }, ], datePublic: "2018-04-26T00:00:00", descriptions: [ { lang: "en", value: "A buffer overflow can be triggered in LeviStudio HMI Editor, Version 1.10 part of Wecon LeviStudioU 1.8.29, and PI Studio HMI Project Programmer, Build: November 11, 2017 and prior by opening a specially crafted file.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-121", description: "Stack-Based Buffer Overflow CWE-121", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-04-30T09:57:01", orgId: "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", shortName: "icscert", }, references: [ { name: "104016", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104016", }, { tags: [ "x_refsource_MISC", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-116-02", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "ics-cert@hq.dhs.gov", DATE_PUBLIC: "2018-04-26T00:00:00", ID: "CVE-2018-7527", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LeviStudio HMI Editor", version: { version_data: [ { version_value: "Version 1.10 part of Wecon LeviStudioU 1.8.29 and prior", }, ], }, }, { product_name: "PI Studio HMI Project Programmer", version: { version_data: [ { version_value: "Build: November 11, 2017 and prior", }, ], }, }, ], }, vendor_name: "WECON Technology Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A buffer overflow can be triggered in LeviStudio HMI Editor, Version 1.10 part of Wecon LeviStudioU 1.8.29, and PI Studio HMI Project Programmer, Build: November 11, 2017 and prior by opening a specially crafted file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Stack-Based Buffer Overflow CWE-121", }, ], }, ], }, references: { reference_data: [ { name: "104016", refsource: "BID", url: "http://www.securityfocus.com/bid/104016", }, { name: "https://ics-cert.us-cert.gov/advisories/ICSA-18-116-02", refsource: "MISC", url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-116-02", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", assignerShortName: "icscert", cveId: "CVE-2018-7527", datePublished: "2018-04-26T20:00:00Z", dateReserved: "2018-02-26T00:00:00", dateUpdated: "2024-09-16T23:46:12.317Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2018-04-26 20:29
Modified
2024-11-21 04:12
Severity ?
Summary
A buffer overflow can be triggered in LeviStudio HMI Editor, Version 1.10 part of Wecon LeviStudioU 1.8.29, and PI Studio HMI Project Programmer, Build: November 11, 2017 and prior by opening a specially crafted file.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/104016 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-116-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104016 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-116-02 | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
we-con | levistudio_hmi_editor | 1.10 | |
we-con | levistudiou | * | |
we-con | pi_studio_hmi_project_programmer | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:we-con:levistudio_hmi_editor:1.10:*:*:*:*:*:*:*", matchCriteriaId: "BB9849CD-9BCE-4734-AC49-08151193D35E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:we-con:levistudiou:*:*:*:*:*:*:*:*", matchCriteriaId: "84F1F7EC-637F-4AF1-BA98-49309BA21954", versionEndIncluding: "1.8.29", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:we-con:pi_studio_hmi_project_programmer:*:*:*:*:*:*:*:*", matchCriteriaId: "8DAAD23E-278C-48F7-B67C-DB73196D6229", versionEndIncluding: "2017-11-11", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A buffer overflow can be triggered in LeviStudio HMI Editor, Version 1.10 part of Wecon LeviStudioU 1.8.29, and PI Studio HMI Project Programmer, Build: November 11, 2017 and prior by opening a specially crafted file.", }, { lang: "es", value: "Se puede desencadenar un desbordamiento de búfer en LeviStudio HMI Editor 1.10, parte de Wecon LeviStudioU 1.8.29 y en PI Studio HMI Project Programmer, Build: Noviembre 11, 2017 y anteriores abriendo un archivo especialmente manipulado.", }, ], id: "CVE-2018-7527", lastModified: "2024-11-21T04:12:18.080", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-04-26T20:29:00.523", references: [ { source: "ics-cert@hq.dhs.gov", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104016", }, { source: "ics-cert@hq.dhs.gov", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-116-02", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104016", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-116-02", }, ], sourceIdentifier: "ics-cert@hq.dhs.gov", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-121", }, ], source: "ics-cert@hq.dhs.gov", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }