ID

VAR-201709-1295


TITLE

(0Day) Eaton ELCSoft DEV File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-17-816

DESCRIPTION

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Eaton ELCSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of a DEV file. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process.

Trust: 0.7

sources: ZDI: ZDI-17-816

AFFECTED PRODUCTS

vendor:eatonmodel:elcsoftscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-17-816

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: ZDI-17-816
value: HIGH

Trust: 0.7

ZDI: ZDI-17-816
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

sources: ZDI: ZDI-17-816

EXTERNAL IDS

db:ZDI_CANid:ZDI-CAN-4555

Trust: 0.7

db:ZDIid:ZDI-17-816

Trust: 0.7

sources: ZDI: ZDI-17-816

CREDITS

axt

Trust: 0.7

sources: ZDI: ZDI-17-816

SOURCES

db:ZDIid:ZDI-17-816

LAST UPDATE DATE

2022-05-17T02:08:03.744000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-816date:2017-09-26T00:00:00

SOURCES RELEASE DATE

db:ZDIid:ZDI-17-816date:2017-09-26T00:00:00