Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could lead to a stack-based buffer overflow while trying to copy to a buffer during font string handling. An attacker could leverage this vulnerability to execute code in the context of the current process.

Project Subscriptions

Vendors Products
Deltaww Subscribe
Dopsoft Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-24854 Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could lead to a stack-based buffer overflow while trying to copy to a buffer during font string handling. An attacker could leverage this vulnerability to execute code in the context of the current process.
Fixes

Solution

DOPSoft 2 will not receive an update to mitigate these vulnerabilities because it is an end-of-life product. Delta Electronics recommends users to switch to the replacement software when available


Workaround

No workaround given by the vendor.

History

Wed, 23 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-23T19:27:44.541Z

Reserved: 2021-08-10T00:00:00.000Z

Link: CVE-2021-38402

cve-icon Vulnrichment

Updated: 2024-08-04T01:37:16.542Z

cve-icon NVD

Status : Modified

Published: 2021-09-17T19:15:08.570

Modified: 2024-11-21T06:17:00.567

Link: CVE-2021-38402

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses