ID

VAR-201709-1294


TITLE

(0Day) Eaton ELCSoft Device Comment Range Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-17-813

DESCRIPTION

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Eaton ELCSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of a Device Comment Range record in an EPC file. The issue results from the lack of proper validation of user-supplied data, which can result in a write to an arbitrary address. An attacker can leverage this vulnerability to execute arbitrary code under the context of the process.

Trust: 0.7

sources: ZDI: ZDI-17-813

AFFECTED PRODUCTS

vendor:eatonmodel:elcsoftscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-17-813

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: ZDI-17-813
value: HIGH

Trust: 0.7

ZDI: ZDI-17-813
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

sources: ZDI: ZDI-17-813

EXTERNAL IDS

db:ZDI_CANid:ZDI-CAN-4552

Trust: 0.7

db:ZDIid:ZDI-17-813

Trust: 0.7

sources: ZDI: ZDI-17-813

CREDITS

axt

Trust: 0.7

sources: ZDI: ZDI-17-813

SOURCES

db:ZDIid:ZDI-17-813

LAST UPDATE DATE

2022-05-17T02:10:30.964000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-813date:2017-09-26T00:00:00

SOURCES RELEASE DATE

db:ZDIid:ZDI-17-813date:2017-09-26T00:00:00