In Schneider Electric U.motion Builder software versions prior to v1.3.4, this exploit occurs when the submitted data of an input string is evaluated as a command by the application. In this way, the attacker could execute code, read the stack, or cause a segmentation fault in the running application.
References
Link | Resource |
---|---|
https://www.schneider-electric.com/en/download/document/SEVD-2018-151-01/ | Vendor Advisory |
http://www.securityfocus.com/bid/104447 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-07-03 07:29
Updated : 2019-09-30 06:37
NVD link : CVE-2018-7784
Mitre link : CVE-2018-7784
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
schneider-electric
- u.motion