If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in CEtherIPTagItem can be exploited, allowing the attacker to remotely execute arbitrary code.
Metrics
Affected Vendors & Products
References
History
Mon, 11 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Deltaww
Deltaww diascreen |
|
CPEs | cpe:2.3:a:deltaww:diascreen:*:*:*:*:*:*:*:* | |
Vendors & Products |
Deltaww
Deltaww diascreen |
|
Metrics |
ssvc
|
Mon, 11 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in CEtherIPTagItem can be exploited, allowing the attacker to remotely execute arbitrary code. | |
Title | Delta Electronics DIAScreen Stack-based Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2024-11-11T14:59:38.364Z
Updated: 2024-11-11T16:07:37.602Z
Reserved: 2024-07-16T16:12:58.987Z
Link: CVE-2024-39354
Vulnrichment
Updated: 2024-11-11T16:07:10.380Z
NVD
Status : Awaiting Analysis
Published: 2024-11-11T15:15:05.243
Modified: 2024-11-12T13:55:21.227
Link: CVE-2024-39354
Redhat
No data.