SB2018010418 - Multiple vulnerabilities in Advantech WebAccess 



SB2018010418 - Multiple vulnerabilities in Advantech WebAccess

Published: January 4, 2018 Updated: January 9, 2018

Security Bulletin ID SB2018010418
Severity
Low
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Untrusted pointer dereference (CVE-ID: CVE-2017-16728)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to untrusted pointer dereference. A remote attacker can ause the program to use an invalid memory address, resulting in a program crash.

2) Stack-based buffer overflow (CVE-ID: CVE-2017-16724)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to stack-based buffer overflow. A remote attacker can use the program to use an invalid memory address, resulting in a program crash.

3) Path traversal (CVE-ID: CVE-2017-16720)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to path traversal. A remote attacker can bypass security restrictions and gain access to files within the directory structure of the target device.

4) SQL injection (CVE-ID: CVE-2017-16716)

The vulnerability allows a remote attacker to execute arbitrary SQL commands in web application database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL commands in web application database.

Successful exploitation of the vulnerability may allow an attacker to gain administrative access to vulnerable web application.


5) Improper input validation (CVE-ID: CVE-2017-16753)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to insufficient validation of user-supplied input. A remote attacker can supply specially crafted file and cause the program to crash.

Remediation

Install update from vendor's website.