A crafted DPA file could force Delta Electronics DIAScreen to overflow a stack-based buffer, which could allow an attacker to execute arbitrary code.
Metrics
Affected Vendors & Products
References
History
Mon, 12 Aug 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 |
Tue, 06 Aug 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Deltaww
Deltaww diascreen |
|
CPEs | cpe:2.3:a:deltaww:diascreen:*:*:*:*:*:*:*:* | |
Vendors & Products |
Deltaww
Deltaww diascreen |
|
Metrics |
ssvc
|
Tue, 06 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A crafted DPA file could force Delta Electronics DIAScreen to overflow a stack-based buffer, which could allow an attacker to execute arbitrary code. | |
Title | Delta Electronics DIAScreen Stack-Based Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2024-08-06T16:50:26.354Z
Updated: 2024-08-06T17:55:44.063Z
Reserved: 2024-08-05T16:30:17.980Z
Link: CVE-2024-7502
Vulnrichment
Updated: 2024-08-06T17:55:34.720Z
NVD
Status : Analyzed
Published: 2024-08-06T17:15:54.353
Modified: 2024-08-12T18:50:46.897
Link: CVE-2024-7502
Redhat
No data.