标题 | 简介 | 类型 | 公开时间 | ||||||||||
|
|||||||||||||
|
|||||||||||||
详情 | |||||||||||||
[SAFE-ID: JIWO-2024-288] 作者: ecawen 发表于: [2017-08-08]
本文共 [645] 位读者顶过
研华WebAccess软件是研华物联网应用平台解决方案的核心,为用户提供一个基于HTML5技术用户界面,实现跨平台、跨浏览器的数据访问体验。使用WebAccess后,用户可以建立一个信息管理平台,同步提高垂直市场管理发展的效率。
研华Advantech WebAccess爆出10个0Day漏洞,
在CVSS评分都为7.5,据公开信息显示,厂商和美国ICS-CERT都已经收到并确认这些信息。
ZDI-17-567: (0Day) Advantech WebAccess nvA1Media Connect MediaUsername Stack-based Buffer Overflow 远程代码执行漏洞
http://www.zerodayinitiative.com/advisories/ZDI-17-567/
缓解措施:
The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\E19E79EC-F62E-40A0-952D-E49AEC7BEC2F
If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. [出自:jiwo.org]
ZDI-17-566: (0Day) Advantech WebAccess nvA1Media DeviceType 3 Stack-based Buffer Overflow Remote 远程代码执行漏洞
http://www.zerodayinitiative.com/advisories/ZDI-17-566/
缓解措施:
The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\7E19E79EC-F62E-40A0-952D-E49AEC7BEC2F
If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser.
ZDI-17-565: (0Day) Advantech WebAccess nvA1Media Connect MediaPassword Stack-based Buffer Overflow 远程代码执行漏洞
http://www.zerodayinitiative.com/advisories/ZDI-17-565/
缓解措施:
The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\E19E79EC-F62E-40A0-952D-E49AEC7BEC2F
If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser.
ZDI-17-564: (0Day) Advantech WebAccess RtspVapgDecoderNew2 PMSettingData3D Name Heap-based Buffer Overflow远程代码执行漏洞
http://www.zerodayinitiative.com/advisories/ZDI-17-564/
缓解措施:
The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F
If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser.
ZDI-17-563: (0Day) Advantech WebAccess RtspVapgDecoderNew2 SetLangStringHex Out-of-bounds Access 远程代码执行漏洞
http://www.zerodayinitiative.com/advisories/ZDI-17-563/
缓解措施:
The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F
If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser.
ZDI-17-562: (0Day) Advantech WebAccess RtspVapgDecoderNew2 PMSettingData3D Height Stack-based Buffer Overflow远程代码执行漏洞
http://www.zerodayinitiative.com/advisories/ZDI-17-562/
缓解措施:
The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F
If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser.
ZDI-17-561: (0Day) Advantech WebAccess TpMegaJVT setCameraName Buffer Overflow 远程代码执行漏洞
http://www.zerodayinitiative.com/advisories/ZDI-17-561/
缓解措施:
The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\BF28239A-3823-40FF-BC02-2DA4D9DBB1EE
If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser.
ZDI-17-560: (0Day) Advantech WebAccess RtspVapgDecoderNew2 SetPaybackFilePath Stack-based Buffer Overflow 远程代码执行漏洞
http://www.zerodayinitiative.com/advisories/ZDI-17-560/
缓解措施:
The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F
If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser.
ZDI-17-559: (0Day) Advantech WebAccess TpMegaJVT createStream Heap-based Buffer Overflow 远程代码执行漏洞
http://www.zerodayinitiative.com/advisories/ZDI-17-559/
缓解措施:
The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\BF28239A-3823-40FF-BC02-2DA4D9DBB1EE
If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser.
ZDI-17-558: (0Day) Advantech WebAccess RtspVapgDecoderNew2 PMSettingData3D Width Stack-based Buffer Overflow 远程代码执行漏洞
http://www.zerodayinitiative.com/advisories/ZDI-17-558/
缓解措施:
The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F
If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser.
|