ID

VAR-201709-1291


TITLE

(0Day) Eaton ELCSoft SegCmt Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-17-819

DESCRIPTION

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Eaton ELCSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of a SegCmt record in an EPC file. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process.

Trust: 0.7

sources: ZDI: ZDI-17-819

AFFECTED PRODUCTS

vendor:eatonmodel:elcsoftscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-17-819

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: ZDI-17-819
value: HIGH

Trust: 0.7

ZDI: ZDI-17-819
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

sources: ZDI: ZDI-17-819

EXTERNAL IDS

db:ZDI_CANid:ZDI-CAN-4553

Trust: 0.7

db:ZDIid:ZDI-17-819

Trust: 0.7

sources: ZDI: ZDI-17-819

CREDITS

axt

Trust: 0.7

sources: ZDI: ZDI-17-819

SOURCES

db:ZDIid:ZDI-17-819

LAST UPDATE DATE

2022-05-17T02:03:13.981000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-819date:2017-09-26T00:00:00

SOURCES RELEASE DATE

db:ZDIid:ZDI-17-819date:2017-09-26T00:00:00