cve/2019/CVE-2019-5182.md
2024-06-18 02:51:15 +02:00

18 lines
1.0 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2019-5182](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5182)
![](https://img.shields.io/static/v1?label=Product&message=WAGO%20PFC200&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=stack%20buffer%20overflow&color=brighgreen)
### Description
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service I/O-Check functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file.The destination buffer sp+0x440 is overflowed with the call to sprintf() for any type values that are greater than 1024-len(/etc/config-tools/config_interfaces interface=X1 state=enabled config-type=) in length. A type value of length 0x3d9 will cause the service to crash.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963
#### Github
No PoCs found on GitHub currently.