研华Advantech WebAccess爆出10个0Day漏洞 都属于远程代码执行漏洞

在CVSS评分都为7.5,据公开信息显示,厂商和美国ICS-CERT都已经收到并确认这些信息。

ZDI-17-567: (0Day) Advantech WebAccess nvA1Media Connect MediaUsername Stack-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-567/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\E19E79EC-F62E-40A0-952D-E49AEC7BEC2F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-566: (0Day) Advantech WebAccess nvA1Media DeviceType 3 Stack-based Buffer Overflow Remote 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-566/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\7E19E79EC-F62E-40A0-952D-E49AEC7BEC2F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-565: (0Day) Advantech WebAccess nvA1Media Connect MediaPassword Stack-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-565/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\E19E79EC-F62E-40A0-952D-E49AEC7BEC2F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-564: (0Day) Advantech WebAccess RtspVapgDecoderNew2 PMSettingData3D Name Heap-based Buffer Overflow远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-564/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-563: (0Day) Advantech WebAccess RtspVapgDecoderNew2 SetLangStringHex Out-of-bounds Access 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-563/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-562: (0Day) Advantech WebAccess RtspVapgDecoderNew2 PMSettingData3D Height Stack-based Buffer Overflow远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-562/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-561: (0Day) Advantech WebAccess TpMegaJVT setCameraName  Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-561/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\BF28239A-3823-40FF-BC02-2DA4D9DBB1EE

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-560: (0Day) Advantech WebAccess RtspVapgDecoderNew2 SetPaybackFilePath Stack-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-560/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-559: (0Day) Advantech WebAccess TpMegaJVT createStream  Heap-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-559/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\BF28239A-3823-40FF-BC02-2DA4D9DBB1EE

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-558: (0Day) Advantech WebAccess RtspVapgDecoderNew2 PMSettingData3D Width Stack-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-558/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

原文发布时间:2017年8月8日 

本文由:zeroday发布,版权归属于原作者

原文链接:http://toutiao.secjia.com/advantech-webaccess-10-0day

时间: 2024-11-05 22:38:32

研华Advantech WebAccess爆出10个0Day漏洞 都属于远程代码执行漏洞的相关文章

绿盟科技网络安全威胁周报2017.10 请关注Struts2远程代码执行漏洞CVE-2017-5638

绿盟科技发布了本周安全通告,周报编号NSFOCUS-17-10,绿盟科技漏洞库本周新增32条,其中高危1条.本次周报建议大家关注 Struts2 远程代码执行漏洞 CVE-2017-5638 .攻击者通过恶意的Content-Type值,可导致远程代码执行.目前,Apache官方已针对该漏洞已经发布安全公告和补丁.请受影响用户及时检查升级,修复漏洞. 焦点漏洞 Struts2 远程代码执行漏洞 NSFOCUS ID 36031 CVE ID CVE-2017-5638 受影响版本 Struts

IIS 6.0 WebDAV远程代码执行0day漏洞 CVE-2017-7269 PoC已经公开了 但Windows 2003已经没有更新服务了

3月27日,在Windows 2003 R2上使用IIS 6.0 爆出了0Day漏洞(CVE-2017-7269,CNNVD-201703-1151),PoC开始流传,但糟糕的是这产品已经停止更新了,建议大家要么关闭IIS 下的WebDAV服务,要么升级到Windows 2016.绿盟科技发布威胁预警通告,全文如下. Update: 绿盟科技已经发布了该漏洞的分析及防护方案 Microsoft Windows Server 2003 R2 IIS 6.0远程代码执行威胁预警通告 3月27日,Zh

漏洞预警:MySQL代码执行0-day漏洞 可本地提权

来自波兰的安全研究人员Dawid Golunski刚刚发现了两个MySQL的0-day漏洞,影响到所有版本分支.默认配置的MySQL服务器(5.7.5.6和5.5),包括最新版本.攻击者可以远程和本地利用漏洞.攻击者成功利用漏洞后,可以ROOT权限执行代码,完全控制MySQL数据库.攻击者仅需有FILE权限即可实现ROOT提权,进而控制服务器. 漏洞编号: CVE-2016-6662与CVE-2016-6663 漏洞影响: MySQL <= 5.7.15 远程代码执行/ 提权 (0day) 5.

ImageMagick重大0day漏洞-远程代码执行

多的网站和漏洞都在使用ImageMagick处理图片,最近ImageMagick被爆出重大漏洞. 这个漏洞是由于当在转换图片format的时候,由于image decoder缺少了对文件名的过滤引起的远程代码执行. 重现如下: vim crack.jpg 添加如下内容: push graphic-context   viewbox 0 0 640 480   fill 'url(https://example.com/image.jpg"|ls "-la)'   pop graphic

Intel安装框架爆出带本地提权的任意代码执行漏洞CVE-2017-5688

Intel发布安全公告 ,执行使用Intel安装框架的可执行安装文件,例如Intel SSD Toolbox - v3.4.3.exe,就会出现两个漏洞,都会导致任意代码执行并提权. 受影响产品 Intel Solid State Drive Toolbox  3.4.5之前所有版本 缓解建议:Intel建议所有用户尽快将受影响产品升级到 Intel Solid State Drive Toolbox version 3.4.5 及以上版本 https://downloadcenter.inte

Fastjson 爆出远程代码执行高危漏洞,更新版本已修复

漏洞介绍fastjson在1.2.24以及之前版本近日曝出代码执行漏洞,当用户提交一个精心构造的恶意的序列化数据到服务器端时,fastjson在反序列化时存在漏洞,可导致远程任意代码执行漏洞. 风险:高风险方式:黑客通过利用漏洞可以实现远程代码执行影响:1.2.24及之前版本安全版本:>=1.2.28 修复方法 1.请将fastjson升级到1.2.28或者更新版本 <groupId>com.alibaba</groupId> <artifactId>fastjs

cvi与研华daqnavi-CVI与研华DAQNavi例程

问题描述 CVI与研华DAQNavi例程 谁有LabWindows CVI与研华DAQNavi的例程,麻烦分享一下,最近做项目遇到这个问题不知道如何去做了

设置-研华PCI-1715U采集信号失真

问题描述 研华PCI-1715U采集信号失真 用研华PCI-1715U自带例程采集信号发生器的输出信号,有时候会出现信号失真的情况,就是一半是正常的,一半类似叠加了一个直流量,信号发生器确定是没有问题的,请问板卡的那个参数设置有问题吗?

台达PLC编程软件PMSoft和WPLSoft爆出11个0Day 没有CVE没有补丁

台达PLC编程软件PMSoft和WPLSoft爆出11个0Day漏洞,美国ICS-CERT已经获知漏洞情况,台达,这些0Day漏洞经过120天后,没有看到台达发布补丁,相关信息被公开. 台达是工业自动化厂商 据其官网资料显示 台达是全球电源管理及散热方案的领导厂商,二十多年来,目前共设有广东东莞.江苏吴江.安徽芜湖.湖南郴州四个主要生产基地:二十三个研发中心 (超过3,000名研发工程师).49 个运营网点.73个服务网点,员工总数达5万余人.台达中国区2016年的营收超过397亿人民币. 台达