CVE-2019-6537 Vulnerability Details

  /     /     /  

CVE-2019-6537 Metadata Quick Info

CVE Published: 13/02/2019 | CVE Updated: 16/09/2024 | CVE Year: 2019
Source: icscert | Vendor: ICS-CERT | Product: WECON LeviStudioU
Status : PUBLISHED

CVE-2019-6537 Description

Multiple stack-based buffer overflow vulnerabilities in WECON LeviStudioU version 1.8.56 and prior may be exploited when parsing strings within project files. The process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage these vulnerabilities to execute code under the context of the current process. Mat Powell, Ziad Badawi, and Natnael Samson working with Trend Micro\'s Zero Day Initiative, reported these vulnerabilities to NCCIC.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-121
CWE Name: Stack-based buffer overflow CWE-121
Source: ICS-CERT

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).