Vulnerabilidad en Advantech WebAccess (CVE-2016-0856)
Gravedad CVSS v3.1:
CRÍTICA
Tipo:
CWE-119
Restricción de operaciones inapropiada dentro de los límites del búfer de la memoria
Fecha de publicación:
15/01/2016
Última modificación:
12/04/2025
Descripción
Múltiples desbordamientos de buffer basado en pila en Advantech WebAccess en versiones anteriores a 8.1 permiten a atacantes remotos ejecutar código arbitrario a través de vectores no especificados.
Impacto
Puntuación base 3.x
9.80
Gravedad 3.x
CRÍTICA
Puntuación base 2.0
10.00
Gravedad 2.0
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:* | 8.0 (incluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://www.zerodayinitiative.com/advisories/ZDI-16-100
- http://www.zerodayinitiative.com/advisories/ZDI-16-101
- http://www.zerodayinitiative.com/advisories/ZDI-16-102
- http://www.zerodayinitiative.com/advisories/ZDI-16-103
- http://www.zerodayinitiative.com/advisories/ZDI-16-106
- http://www.zerodayinitiative.com/advisories/ZDI-16-108
- http://www.zerodayinitiative.com/advisories/ZDI-16-109
- http://www.zerodayinitiative.com/advisories/ZDI-16-110
- http://www.zerodayinitiative.com/advisories/ZDI-16-111
- http://www.zerodayinitiative.com/advisories/ZDI-16-112
- http://www.zerodayinitiative.com/advisories/ZDI-16-113
- http://www.zerodayinitiative.com/advisories/ZDI-16-114
- http://www.zerodayinitiative.com/advisories/ZDI-16-115
- http://www.zerodayinitiative.com/advisories/ZDI-16-116
- http://www.zerodayinitiative.com/advisories/ZDI-16-117
- http://www.zerodayinitiative.com/advisories/ZDI-16-118
- http://www.zerodayinitiative.com/advisories/ZDI-16-120
- https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01
- http://www.zerodayinitiative.com/advisories/ZDI-16-100
- http://www.zerodayinitiative.com/advisories/ZDI-16-101
- http://www.zerodayinitiative.com/advisories/ZDI-16-102
- http://www.zerodayinitiative.com/advisories/ZDI-16-103
- http://www.zerodayinitiative.com/advisories/ZDI-16-106
- http://www.zerodayinitiative.com/advisories/ZDI-16-108
- http://www.zerodayinitiative.com/advisories/ZDI-16-109
- http://www.zerodayinitiative.com/advisories/ZDI-16-110
- http://www.zerodayinitiative.com/advisories/ZDI-16-111
- http://www.zerodayinitiative.com/advisories/ZDI-16-112
- http://www.zerodayinitiative.com/advisories/ZDI-16-113
- http://www.zerodayinitiative.com/advisories/ZDI-16-114
- http://www.zerodayinitiative.com/advisories/ZDI-16-115
- http://www.zerodayinitiative.com/advisories/ZDI-16-116
- http://www.zerodayinitiative.com/advisories/ZDI-16-117
- http://www.zerodayinitiative.com/advisories/ZDI-16-118
- http://www.zerodayinitiative.com/advisories/ZDI-16-120
- https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01



