标题 简介 类型 公开时间
关联规则 关联知识 关联工具 关联文档 关联抓包
参考1(官网)
参考2
参考3
详情
[SAFE-ID: JIWO-2024-288]   作者: ecawen 发表于: [2017-08-08]

本文共 [539] 位读者顶过

研华WebAccess软件是研华物联网应用平台解决方案的核心,为用户提供一个基于HTML5技术用户界面,实现跨平台、跨浏览器的数据访问体验。使用WebAccess后,用户可以建立一个信息管理平台,同步提高垂直市场管理发展的效率。

研华Advantech WebAccess爆出10个0Day漏洞,

在CVSS评分都为7.5,据公开信息显示,厂商和美国ICS-CERT都已经收到并确认这些信息。

ZDI-17-567: (0Day) Advantech WebAccess nvA1Media Connect MediaUsername Stack-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-567/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\E19E79EC-F62E-40A0-952D-E49AEC7BEC2F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. [出自:jiwo.org]
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-566: (0Day) Advantech WebAccess nvA1Media DeviceType 3 Stack-based Buffer Overflow Remote 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-566/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\7E19E79EC-F62E-40A0-952D-E49AEC7BEC2F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-565: (0Day) Advantech WebAccess nvA1Media Connect MediaPassword Stack-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-565/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\E19E79EC-F62E-40A0-952D-E49AEC7BEC2F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-564: (0Day) Advantech WebAccess RtspVapgDecoderNew2 PMSettingData3D Name Heap-based Buffer Overflow远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-564/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-563: (0Day) Advantech WebAccess RtspVapgDecoderNew2 SetLangStringHex Out-of-bounds Access 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-563/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-562: (0Day) Advantech WebAccess RtspVapgDecoderNew2 PMSettingData3D Height Stack-based Buffer Overflow远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-562/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-561: (0Day) Advantech WebAccess TpMegaJVT setCameraName  Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-561/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\BF28239A-3823-40FF-BC02-2DA4D9DBB1EE

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-560: (0Day) Advantech WebAccess RtspVapgDecoderNew2 SetPaybackFilePath Stack-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-560/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-559: (0Day) Advantech WebAccess TpMegaJVT createStream  Heap-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-559/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\BF28239A-3823-40FF-BC02-2DA4D9DBB1EE

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-558: (0Day) Advantech WebAccess RtspVapgDecoderNew2 PMSettingData3D Width Stack-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-558/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 


评论

暂无
发表评论
 返回顶部 
热度(539)
 关注微信