An exploitable heap overflow vulnerability exists in the WkbProgramLow function of WibuKey Network server management, version 6.40.2402.500. A specially crafted TCP packet can cause a heap overflow, potentially leading to remote code execution. An attacker can send a malformed TCP packet to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0659 | Exploit Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-760124.pdf | Mitigation Third Party Advisory |
http://www.securityfocus.com/bid/107005 | Third Party Advisory VDB Entry |
https://cert-portal.siemens.com/productcert/pdf/ssa-844562.pdf | Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Information
Published : 2019-02-05 15:29
Updated : 2022-04-19 11:15
NVD link : CVE-2018-3991
Mitre link : CVE-2018-3991
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
wibu
- wibukey
microsoft
- windows
siemens
- simatic_wincc_open_architecture