Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2018-10602
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/104935 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104935 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | ||
---|---|---|---|---|
WECON Technology Co., Ltd. | LeviStudioU |
Version: Versions 1.8.29 and 1.8.44 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:39:08.022Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03", }, { name: "104935", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104935", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "LeviStudioU", vendor: "WECON Technology Co., Ltd.", versions: [ { status: "affected", version: "Versions 1.8.29 and 1.8.44", }, ], }, ], datePublic: "2018-07-31T00:00:00", descriptions: [ { lang: "en", value: "WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-121", description: "STACK-BASED BUFFER OVERFLOW CWE-121", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-09-27T09:57:01", orgId: "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", shortName: "icscert", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03", }, { name: "104935", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104935", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "ics-cert@hq.dhs.gov", DATE_PUBLIC: "2018-07-31T00:00:00", ID: "CVE-2018-10602", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LeviStudioU", version: { version_data: [ { version_value: "Versions 1.8.29 and 1.8.44", }, ], }, }, ], }, vendor_name: "WECON Technology Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "STACK-BASED BUFFER OVERFLOW CWE-121", }, ], }, ], }, references: { reference_data: [ { name: "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03", refsource: "MISC", url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03", }, { name: "104935", refsource: "BID", url: "http://www.securityfocus.com/bid/104935", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", assignerShortName: "icscert", cveId: "CVE-2018-10602", datePublished: "2018-09-26T18:00:00Z", dateReserved: "2018-05-01T00:00:00", dateUpdated: "2024-09-16T19:19:09.394Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2018-10602\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2018-09-26T18:29:00.323\",\"lastModified\":\"2024-11-21T03:41:38.663\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.\"},{\"lang\":\"es\",\"value\":\"WECON LeviStudio en versiones 1.8.29 y 1.8.44 tiene múltiples vulnerabilidades de desbordamiento de búfer basado en pila que pueden explotarse cuando la aplicación procesa archivos de proyecto especialmente manipulados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:we-con:levistudiou:1.8.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFDC2D4D-F9DE-4D99-8C14-72918FDC88CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:we-con:levistudiou:1.8.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01CF1E2F-8382-4270-9B1C-4C0DFBE2E7E5\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/104935\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/104935\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}", }, }
fkie_cve-2018-10602
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/104935 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104935 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
we-con | levistudiou | 1.8.29 | |
we-con | levistudiou | 1.8.44 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:we-con:levistudiou:1.8.29:*:*:*:*:*:*:*", matchCriteriaId: "DFDC2D4D-F9DE-4D99-8C14-72918FDC88CD", vulnerable: true, }, { criteria: "cpe:2.3:a:we-con:levistudiou:1.8.44:*:*:*:*:*:*:*", matchCriteriaId: "01CF1E2F-8382-4270-9B1C-4C0DFBE2E7E5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.", }, { lang: "es", value: "WECON LeviStudio en versiones 1.8.29 y 1.8.44 tiene múltiples vulnerabilidades de desbordamiento de búfer basado en pila que pueden explotarse cuando la aplicación procesa archivos de proyecto especialmente manipulados.", }, ], id: "CVE-2018-10602", lastModified: "2024-11-21T03:41:38.663", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 9.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-09-26T18:29:00.323", references: [ { source: "ics-cert@hq.dhs.gov", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104935", }, { source: "ics-cert@hq.dhs.gov", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104935", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03", }, ], sourceIdentifier: "ics-cert@hq.dhs.gov", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-121", }, ], source: "ics-cert@hq.dhs.gov", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
ICSA-18-212-03
Vulnerability from csaf_cisa
Notes
{ document: { acknowledgments: [ { organization: "The NSFOCUS security team", summary: "reporting these vulnerabilities to NCCIC", }, { names: [ "Ghirmay Desta", ], summary: "reporting these vulnerabilities to NCCIC", }, { names: [ "Mat Powell", "Jose Luis Zayas Banderas", ], organization: "Trend Micro 's Zero Day Initiative", summary: "reporting these vulnerabilities to NCCIC", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en-US", notes: [ { category: "general", text: "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", title: "CISA Disclaimer", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "summary", text: "Successful exploitation of these vulnerabilities could allow an attacker to execute remote code.", title: "Risk evaluation", }, { category: "other", text: "Critical Manufacturing, Energy, Water and Wastewater Systems", title: "Critical infrastructure sectors", }, { category: "other", text: "Worldwide", title: "Countries/areas deployed", }, { category: "other", text: "China", title: "Company headquarters location", }, { category: "general", text: "NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", title: "Recommended Practices", }, { category: "general", text: "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "other", text: "No known public exploits specifically target these vulnerabilities.", title: "Exploitability", }, ], publisher: { category: "coordinator", contact_details: "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "self", summary: "ICS Advisory ICSA-18-212-03 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-212-03.json", }, { category: "self", summary: "ICS Advisory ICSA-18-212-03 Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-18-212-03", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B", }, ], title: "WECON LeviStudioU (Update A)", tracking: { current_release_date: "2018-10-02T00:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-18-212-03", initial_release_date: "2018-07-31T00:00:00.000000Z", revision_history: [ { date: "2018-07-31T00:00:00.000000Z", legacy_version: "Initial", number: "1", summary: "ICSA-18-212-03 WECON LeviStudioU", }, { date: "2018-10-02T00:00:00.000000Z", legacy_version: "A", number: "2", summary: "ICSA-18-212-03 WECON LeviSudioU (Update A)", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "1.8.29 | 1.8.44", product: { name: "LeviStudioU: Versions 1.8.29 and 1.8.44", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "LeviStudioU", }, ], category: "vendor", name: "WECON", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10602", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, notes: [ { category: "summary", text: "Multiple stack-based buffer overflow vulnerabilities can be exploited when the application processes specially crafted project files.CVE-2018-10602 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "cve.mitre.org", url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-10602", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Updating to the latest version of LeviStudioU may address some of the vulnerabilities.", product_ids: [ "CSAFPID-0001", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2018-10606", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, notes: [ { category: "summary", text: "Multiple heap-based buffer overflow vulnerabilities can be exploited when the application processes specially crafted project files.CVE-2018-10606 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "cve.mitre.org", url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-10606", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Updating to the latest version of LeviStudioU may address some of the vulnerabilities.", product_ids: [ "CSAFPID-0001", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2018-10610", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "An out-of-bounds vulnerability can be exploited when the application processes specially crafted project files.CVE-2018-10610 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "cve.mitre.org", url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-10610", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", }, ], remediations: [ { category: "vendor_fix", details: "Updating to the latest version of LeviStudioU may address some of the vulnerabilities.", product_ids: [ "CSAFPID-0001", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2018-10614", cwe: { id: "CWE-611", name: "Improper Restriction of XML External Entity Reference", }, notes: [ { category: "summary", text: "An XXE vulnerability can be exploited when the application processes specially crafted project XML files.CVE-2018-10614 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "cve.mitre.org", url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-10614", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", }, ], remediations: [ { category: "vendor_fix", details: "Updating to the latest version of LeviStudioU may address some of the vulnerabilities.", product_ids: [ "CSAFPID-0001", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, ], }
icsa-18-212-03
Vulnerability from csaf_cisa
Notes
{ document: { acknowledgments: [ { organization: "The NSFOCUS security team", summary: "reporting these vulnerabilities to NCCIC", }, { names: [ "Ghirmay Desta", ], summary: "reporting these vulnerabilities to NCCIC", }, { names: [ "Mat Powell", "Jose Luis Zayas Banderas", ], organization: "Trend Micro 's Zero Day Initiative", summary: "reporting these vulnerabilities to NCCIC", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en-US", notes: [ { category: "general", text: "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", title: "CISA Disclaimer", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "summary", text: "Successful exploitation of these vulnerabilities could allow an attacker to execute remote code.", title: "Risk evaluation", }, { category: "other", text: "Critical Manufacturing, Energy, Water and Wastewater Systems", title: "Critical infrastructure sectors", }, { category: "other", text: "Worldwide", title: "Countries/areas deployed", }, { category: "other", text: "China", title: "Company headquarters location", }, { category: "general", text: "NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", title: "Recommended Practices", }, { category: "general", text: "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "other", text: "No known public exploits specifically target these vulnerabilities.", title: "Exploitability", }, ], publisher: { category: "coordinator", contact_details: "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "self", summary: "ICS Advisory ICSA-18-212-03 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-212-03.json", }, { category: "self", summary: "ICS Advisory ICSA-18-212-03 Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-18-212-03", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B", }, ], title: "WECON LeviStudioU (Update A)", tracking: { current_release_date: "2018-10-02T00:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-18-212-03", initial_release_date: "2018-07-31T00:00:00.000000Z", revision_history: [ { date: "2018-07-31T00:00:00.000000Z", legacy_version: "Initial", number: "1", summary: "ICSA-18-212-03 WECON LeviStudioU", }, { date: "2018-10-02T00:00:00.000000Z", legacy_version: "A", number: "2", summary: "ICSA-18-212-03 WECON LeviSudioU (Update A)", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "1.8.29 | 1.8.44", product: { name: "LeviStudioU: Versions 1.8.29 and 1.8.44", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "LeviStudioU", }, ], category: "vendor", name: "WECON", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10602", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, notes: [ { category: "summary", text: "Multiple stack-based buffer overflow vulnerabilities can be exploited when the application processes specially crafted project files.CVE-2018-10602 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "cve.mitre.org", url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-10602", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Updating to the latest version of LeviStudioU may address some of the vulnerabilities.", product_ids: [ "CSAFPID-0001", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2018-10606", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, notes: [ { category: "summary", text: "Multiple heap-based buffer overflow vulnerabilities can be exploited when the application processes specially crafted project files.CVE-2018-10606 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "cve.mitre.org", url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-10606", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Updating to the latest version of LeviStudioU may address some of the vulnerabilities.", product_ids: [ "CSAFPID-0001", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2018-10610", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "An out-of-bounds vulnerability can be exploited when the application processes specially crafted project files.CVE-2018-10610 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "cve.mitre.org", url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-10610", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", }, ], remediations: [ { category: "vendor_fix", details: "Updating to the latest version of LeviStudioU may address some of the vulnerabilities.", product_ids: [ "CSAFPID-0001", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2018-10614", cwe: { id: "CWE-611", name: "Improper Restriction of XML External Entity Reference", }, notes: [ { category: "summary", text: "An XXE vulnerability can be exploited when the application processes specially crafted project XML files.CVE-2018-10614 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "cve.mitre.org", url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-10614", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", }, ], remediations: [ { category: "vendor_fix", details: "Updating to the latest version of LeviStudioU may address some of the vulnerabilities.", product_ids: [ "CSAFPID-0001", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-0001", ], }, ], }, ], }
var-201809-0087
Vulnerability from variot
WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Wecon LeviStudioU. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of the UserMgr.xml file. When parsing the GroupList ID element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of Administrator. WECON LeviStudio is a set of human interface programming software from WECON, China
Show details on source website{ affected_products: { _id: null, data: [ { _id: null, model: "levistudiou", scope: null, trust: 10.5, vendor: "wecon", version: null, }, { _id: null, model: "levistudiou", scope: "eq", trust: 1.6, vendor: "we con", version: "1.8.44", }, { _id: null, model: "levistudiou", scope: "eq", trust: 1.6, vendor: "we con", version: "1.8.29", }, { _id: null, model: "levistudiou", scope: "eq", trust: 0.6, vendor: "wecon", version: "1.8.29", }, { _id: null, model: "levistudiou", scope: "eq", trust: 0.6, vendor: "wecon", version: "1.8.44", }, { _id: null, model: null, scope: "eq", trust: 0.2, vendor: "levistudiou", version: "1.8.29", }, { _id: null, model: null, scope: "eq", trust: 0.2, vendor: "levistudiou", version: "1.8.44", }, ], sources: [ { db: "IVD", id: "e2f727b1-39ab-11e9-8ff0-000c29342cb1", }, { db: "ZDI", id: "ZDI-18-824", }, { db: "ZDI", id: "ZDI-18-828", }, { db: "ZDI", id: "ZDI-18-805", }, { db: "ZDI", id: "ZDI-18-850", }, { db: "ZDI", id: "ZDI-18-791", }, { db: "ZDI", id: "ZDI-18-851", }, { db: "ZDI", id: "ZDI-18-800", }, { db: "ZDI", id: "ZDI-18-820", }, { db: "ZDI", id: "ZDI-18-840", }, { db: "ZDI", id: "ZDI-18-864", }, { db: "ZDI", id: "ZDI-18-863", }, { db: "ZDI", id: "ZDI-18-810", }, { db: "ZDI", id: "ZDI-18-830", }, { db: "ZDI", id: "ZDI-18-870", }, { db: "ZDI", id: "ZDI-18-790", }, { db: "CNVD", id: "CNVD-2018-14455", }, { db: "CNNVD", id: "CNNVD-201808-310", }, { db: "NVD", id: "CVE-2018-10602", }, ], }, credits: { _id: null, data: "Mat Powell of Trend Micro Zero Day Initiative", sources: [ { db: "ZDI", id: "ZDI-18-824", }, { db: "ZDI", id: "ZDI-18-828", }, { db: "ZDI", id: "ZDI-18-805", }, { db: "ZDI", id: "ZDI-18-850", }, { db: "ZDI", id: "ZDI-18-791", }, { db: "ZDI", id: "ZDI-18-851", }, { db: "ZDI", id: "ZDI-18-820", }, { db: "ZDI", id: "ZDI-18-840", }, { db: "ZDI", id: "ZDI-18-864", }, { db: "ZDI", id: "ZDI-18-863", }, { db: "ZDI", id: "ZDI-18-810", }, { db: "ZDI", id: "ZDI-18-830", }, { db: "ZDI", id: "ZDI-18-870", }, { db: "ZDI", id: "ZDI-18-790", }, ], trust: 9.8, }, cve: "CVE-2018-10602", cvss: { _id: null, data: [ { cvssV2: [ { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "COMPLETE", baseScore: 9.3, confidentialityImpact: "COMPLETE", exploitabilityScore: 8.6, id: "CVE-2018-10602", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 11.5, vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", exploitabilityScore: 10, id: "CNVD-2018-14455", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "IVD", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", exploitabilityScore: 10, id: "e2f727b1-39ab-11e9-8ff0-000c29342cb1", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.2, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.9 [IVD]", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 2.8, id: "CVE-2018-10602", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, ], severity: [ { author: "ZDI", id: "CVE-2018-10602", trust: 10.5, value: "HIGH", }, { author: "nvd@nist.gov", id: "CVE-2018-10602", trust: 1, value: "HIGH", }, { author: "CNVD", id: "CNVD-2018-14455", trust: 0.6, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201808-310", trust: 0.6, value: "HIGH", }, { author: "IVD", id: "e2f727b1-39ab-11e9-8ff0-000c29342cb1", trust: 0.2, value: "HIGH", }, ], }, ], sources: [ { db: "IVD", id: "e2f727b1-39ab-11e9-8ff0-000c29342cb1", }, { db: "ZDI", id: "ZDI-18-824", }, { db: "ZDI", id: "ZDI-18-828", }, { db: "ZDI", id: "ZDI-18-805", }, { db: "ZDI", id: "ZDI-18-850", }, { db: "ZDI", id: "ZDI-18-791", }, { db: "ZDI", id: "ZDI-18-851", }, { db: "ZDI", id: "ZDI-18-800", }, { db: "ZDI", id: "ZDI-18-820", }, { db: "ZDI", id: "ZDI-18-840", }, { db: "ZDI", id: "ZDI-18-864", }, { db: "ZDI", id: "ZDI-18-863", }, { db: "ZDI", id: "ZDI-18-810", }, { db: "ZDI", id: "ZDI-18-830", }, { db: "ZDI", id: "ZDI-18-870", }, { db: "ZDI", id: "ZDI-18-790", }, { db: "CNVD", id: "CNVD-2018-14455", }, { db: "CNNVD", id: "CNNVD-201808-310", }, { db: "NVD", id: "CVE-2018-10602", }, ], }, description: { _id: null, data: "WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Wecon LeviStudioU. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of the UserMgr.xml file. When parsing the GroupList ID element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of Administrator. WECON LeviStudio is a set of human interface programming software from WECON, China", sources: [ { db: "NVD", id: "CVE-2018-10602", }, { db: "ZDI", id: "ZDI-18-824", }, { db: "ZDI", id: "ZDI-18-790", }, { db: "ZDI", id: "ZDI-18-870", }, { db: "ZDI", id: "ZDI-18-830", }, { db: "ZDI", id: "ZDI-18-810", }, { db: "ZDI", id: "ZDI-18-863", }, { db: "ZDI", id: "ZDI-18-864", }, { db: "ZDI", id: "ZDI-18-840", }, { db: "ZDI", id: "ZDI-18-820", }, { db: "ZDI", id: "ZDI-18-800", }, { db: "ZDI", id: "ZDI-18-851", }, { db: "ZDI", id: "ZDI-18-791", }, { db: "ZDI", id: "ZDI-18-850", }, { db: "ZDI", id: "ZDI-18-805", }, { db: "ZDI", id: "ZDI-18-828", }, { db: "CNVD", id: "CNVD-2018-14455", }, { db: "IVD", id: "e2f727b1-39ab-11e9-8ff0-000c29342cb1", }, ], trust: 11.07, }, external_ids: { _id: null, data: [ { db: "NVD", id: "CVE-2018-10602", trust: 12.9, }, { db: "ICS CERT", id: "ICSA-18-212-03", trust: 2.2, }, { db: "BID", id: "104935", trust: 1.6, }, { db: "CNVD", id: "CNVD-2018-14455", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201808-310", trust: 0.8, }, { db: "ZDI_CAN", id: "ZDI-CAN-5905", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-824", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-5909", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-828", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-5870", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-805", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-5931", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-850", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-5794", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-791", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-5932", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-851", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-5804", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-800", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-5901", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-820", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-5921", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-840", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-5951", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-864", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-5949", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-863", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-5864", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-810", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-5911", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-830", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-5970", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-870", trust: 0.7, }, { db: "ZDI_CAN", id: "ZDI-CAN-5793", trust: 0.7, }, { db: "ZDI", id: "ZDI-18-790", trust: 0.7, }, { db: "IVD", id: "E2F727B1-39AB-11E9-8FF0-000C29342CB1", trust: 0.2, }, ], sources: [ { db: "IVD", id: "e2f727b1-39ab-11e9-8ff0-000c29342cb1", }, { db: "ZDI", id: "ZDI-18-824", }, { db: "ZDI", id: "ZDI-18-828", }, { db: "ZDI", id: "ZDI-18-805", }, { db: "ZDI", id: "ZDI-18-850", }, { db: "ZDI", id: "ZDI-18-791", }, { db: "ZDI", id: "ZDI-18-851", }, { db: "ZDI", id: "ZDI-18-800", }, { db: "ZDI", id: "ZDI-18-820", }, { db: "ZDI", id: "ZDI-18-840", }, { db: "ZDI", id: "ZDI-18-864", }, { db: "ZDI", id: "ZDI-18-863", }, { db: "ZDI", id: "ZDI-18-810", }, { db: "ZDI", id: "ZDI-18-830", }, { db: "ZDI", id: "ZDI-18-870", }, { db: "ZDI", id: "ZDI-18-790", }, { db: "CNVD", id: "CNVD-2018-14455", }, { db: "CNNVD", id: "CNNVD-201808-310", }, { db: "NVD", id: "CVE-2018-10602", }, ], }, id: "VAR-201809-0087", iot: { _id: null, data: true, sources: [ { db: "IVD", id: "e2f727b1-39ab-11e9-8ff0-000c29342cb1", }, { db: "CNVD", id: "CNVD-2018-14455", }, ], trust: 0.08, }, iot_taxonomy: { _id: null, data: [ { category: [ "ICS", ], sub_category: null, trust: 0.8, }, ], sources: [ { db: "IVD", id: "e2f727b1-39ab-11e9-8ff0-000c29342cb1", }, { db: "CNVD", id: "CNVD-2018-14455", }, ], }, last_update_date: "2024-11-29T22:56:15.896000Z", patch: { _id: null, data: [ { title: "Wecon has issued an update to correct this vulnerability. This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline.03/07/18 - ZDI disclosed the report to ICS-CERT03/12/18 - ICS-CERT assigned ICS‑VU‑031741 and notified ZDI07/06/18 - ZDI inquired the status of ICS‑VU‑03174107/09/18 - ICS-CERT replied that they would advise the vendor07/19/18 - ZDI advised ICS-CERT of the intended 0-day date: 07/26/2018-- Mitigation:Given the nature of the vulnerability the only salient mitigation strategy is to restrict interaction with the application to trusted files.", trust: 10.5, url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03", }, { title: "WECON (wei control) LeviStudioU stack heap buffer overflow vulnerability patch", trust: 0.6, url: "https://www.cnvd.org.cn/patchInfo/show/136079", }, ], sources: [ { db: "ZDI", id: "ZDI-18-824", }, { db: "ZDI", id: "ZDI-18-828", }, { db: "ZDI", id: "ZDI-18-805", }, { db: "ZDI", id: "ZDI-18-850", }, { db: "ZDI", id: "ZDI-18-791", }, { db: "ZDI", id: "ZDI-18-851", }, { db: "ZDI", id: "ZDI-18-800", }, { db: "ZDI", id: "ZDI-18-820", }, { db: "ZDI", id: "ZDI-18-840", }, { db: "ZDI", id: "ZDI-18-864", }, { db: "ZDI", id: "ZDI-18-863", }, { db: "ZDI", id: "ZDI-18-810", }, { db: "ZDI", id: "ZDI-18-830", }, { db: "ZDI", id: "ZDI-18-870", }, { db: "ZDI", id: "ZDI-18-790", }, { db: "CNVD", id: "CNVD-2018-14455", }, ], }, problemtype_data: { _id: null, data: [ { problemtype: "CWE-121", trust: 1, }, { problemtype: "CWE-787", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2018-10602", }, ], }, references: { _id: null, data: [ { trust: 12.7, url: "https://ics-cert.us-cert.gov/advisories/icsa-18-212-03", }, { trust: 1.6, url: "http://www.securityfocus.com/bid/104935", }, ], sources: [ { db: "ZDI", id: "ZDI-18-824", }, { db: "ZDI", id: "ZDI-18-828", }, { db: "ZDI", id: "ZDI-18-805", }, { db: "ZDI", id: "ZDI-18-850", }, { db: "ZDI", id: "ZDI-18-791", }, { db: "ZDI", id: "ZDI-18-851", }, { db: "ZDI", id: "ZDI-18-800", }, { db: "ZDI", id: "ZDI-18-820", }, { db: "ZDI", id: "ZDI-18-840", }, { db: "ZDI", id: "ZDI-18-864", }, { db: "ZDI", id: "ZDI-18-863", }, { db: "ZDI", id: "ZDI-18-810", }, { db: "ZDI", id: "ZDI-18-830", }, { db: "ZDI", id: "ZDI-18-870", }, { db: "ZDI", id: "ZDI-18-790", }, { db: "CNVD", id: "CNVD-2018-14455", }, { db: "CNNVD", id: "CNNVD-201808-310", }, { db: "NVD", id: "CVE-2018-10602", }, ], }, sources: { _id: null, data: [ { db: "IVD", id: "e2f727b1-39ab-11e9-8ff0-000c29342cb1", ident: null, }, { db: "ZDI", id: "ZDI-18-824", ident: null, }, { db: "ZDI", id: "ZDI-18-828", ident: null, }, { db: "ZDI", id: "ZDI-18-805", ident: null, }, { db: "ZDI", id: "ZDI-18-850", ident: null, }, { db: "ZDI", id: "ZDI-18-791", ident: null, }, { db: "ZDI", id: "ZDI-18-851", ident: null, }, { db: "ZDI", id: "ZDI-18-800", ident: null, }, { db: "ZDI", id: "ZDI-18-820", ident: null, }, { db: "ZDI", id: "ZDI-18-840", ident: null, }, { db: "ZDI", id: "ZDI-18-864", ident: null, }, { db: "ZDI", id: "ZDI-18-863", ident: null, }, { db: "ZDI", id: "ZDI-18-810", ident: null, }, { db: "ZDI", id: "ZDI-18-830", ident: null, }, { db: "ZDI", id: "ZDI-18-870", ident: null, }, { db: "ZDI", id: "ZDI-18-790", ident: null, }, { db: "CNVD", id: "CNVD-2018-14455", ident: null, }, { db: "CNNVD", id: "CNNVD-201808-310", ident: null, }, { db: "NVD", id: "CVE-2018-10602", ident: null, }, ], }, sources_release_date: { _id: null, data: [ { date: "2018-08-02T00:00:00", db: "IVD", id: "e2f727b1-39ab-11e9-8ff0-000c29342cb1", ident: null, }, { date: "2018-07-26T00:00:00", db: "ZDI", id: "ZDI-18-824", ident: null, }, { date: "2018-07-26T00:00:00", db: "ZDI", id: "ZDI-18-828", ident: null, }, { date: "2018-07-26T00:00:00", db: "ZDI", id: "ZDI-18-805", ident: null, }, { date: "2018-07-26T00:00:00", db: "ZDI", id: "ZDI-18-850", ident: null, }, { date: "2018-07-26T00:00:00", db: "ZDI", id: "ZDI-18-791", ident: null, }, { date: "2018-07-26T00:00:00", db: "ZDI", id: "ZDI-18-851", ident: null, }, { date: "2018-07-26T00:00:00", db: "ZDI", id: "ZDI-18-800", ident: null, }, { date: "2018-07-26T00:00:00", db: "ZDI", id: "ZDI-18-820", ident: null, }, { date: "2018-07-26T00:00:00", db: "ZDI", id: "ZDI-18-840", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-864", ident: null, }, { date: "2018-07-26T00:00:00", db: "ZDI", id: "ZDI-18-863", ident: null, }, { date: "2018-07-26T00:00:00", db: "ZDI", id: "ZDI-18-810", ident: null, }, { date: "2018-07-26T00:00:00", db: "ZDI", id: "ZDI-18-830", ident: null, }, { date: "2018-07-26T00:00:00", db: "ZDI", id: "ZDI-18-870", ident: null, }, { date: "2018-07-26T00:00:00", db: "ZDI", id: "ZDI-18-790", ident: null, }, { date: "2018-08-02T00:00:00", db: "CNVD", id: "CNVD-2018-14455", ident: null, }, { date: "2018-08-13T00:00:00", db: "CNNVD", id: "CNNVD-201808-310", ident: null, }, { date: "2018-09-26T18:29:00.323000", db: "NVD", id: "CVE-2018-10602", ident: null, }, ], }, sources_update_date: { _id: null, data: [ { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-824", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-828", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-805", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-850", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-791", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-851", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-800", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-820", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-840", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-864", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-863", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-810", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-830", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-870", ident: null, }, { date: "2018-08-02T00:00:00", db: "ZDI", id: "ZDI-18-790", ident: null, }, { date: "2018-08-02T00:00:00", db: "CNVD", id: "CNVD-2018-14455", ident: null, }, { date: "2019-10-17T00:00:00", db: "CNNVD", id: "CNNVD-201808-310", ident: null, }, { date: "2024-11-21T03:41:38.663000", db: "NVD", id: "CVE-2018-10602", ident: null, }, ], }, threat_type: { _id: null, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201808-310", }, ], trust: 0.6, }, title: { _id: null, data: "(0Day) Wecon LeviStudioU usermanage GroupList ID Stack-based Buffer Overflow Remote Code Execution Vulnerability", sources: [ { db: "ZDI", id: "ZDI-18-824", }, ], trust: 0.7, }, type: { _id: null, data: "Buffer error", sources: [ { db: "IVD", id: "e2f727b1-39ab-11e9-8ff0-000c29342cb1", }, { db: "CNNVD", id: "CNNVD-201808-310", }, ], trust: 0.8, }, }
gsd-2018-10602
Vulnerability from gsd
{ GSD: { alias: "CVE-2018-10602", description: "WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.", id: "GSD-2018-10602", }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2018-10602", ], details: "WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.", id: "GSD-2018-10602", modified: "2023-12-13T01:22:41.608971Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "ics-cert@hq.dhs.gov", DATE_PUBLIC: "2018-07-31T00:00:00", ID: "CVE-2018-10602", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "LeviStudioU", version: { version_data: [ { version_value: "Versions 1.8.29 and 1.8.44", }, ], }, }, ], }, vendor_name: "WECON Technology Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "STACK-BASED BUFFER OVERFLOW CWE-121", }, ], }, ], }, references: { reference_data: [ { name: "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03", refsource: "MISC", url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03", }, { name: "104935", refsource: "BID", url: "http://www.securityfocus.com/bid/104935", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:we-con:levistudiou:1.8.29:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:we-con:levistudiou:1.8.44:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "ics-cert@hq.dhs.gov", ID: "CVE-2018-10602", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-787", }, ], }, ], }, references: { reference_data: [ { name: "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03", refsource: "MISC", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03", }, { name: "104935", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104935", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 9.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: true, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, }, }, lastModifiedDate: "2020-08-28T13:57Z", publishedDate: "2018-09-26T18:29Z", }, }, }
ghsa-pprw-4438-c2r6
Vulnerability from github
WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.
{ affected: [], aliases: [ "CVE-2018-10602", ], database_specific: { cwe_ids: [ "CWE-787", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2018-09-26T18:29:00Z", severity: "HIGH", }, details: "WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.", id: "GHSA-pprw-4438-c2r6", modified: "2022-05-13T01:17:57Z", published: "2022-05-13T01:17:57Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-10602", }, { type: "WEB", url: "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03", }, { type: "WEB", url: "http://www.securityfocus.com/bid/104935", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.