研华Advantech WebAccess爆出10个0Day漏洞 都属于远程代码执行漏洞

本文涉及的产品
数据可视化DataV,5个大屏 1个月
可视分析地图(DataV-Atlas),3 个项目,100M 存储空间
简介:

在CVSS评分都为7.5,据公开信息显示,厂商和美国ICS-CERT都已经收到并确认这些信息。

ZDI-17-567: (0Day) Advantech WebAccess nvA1Media Connect MediaUsername Stack-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-567/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\E19E79EC-F62E-40A0-952D-E49AEC7BEC2F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-566: (0Day) Advantech WebAccess nvA1Media DeviceType 3 Stack-based Buffer Overflow Remote 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-566/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\7E19E79EC-F62E-40A0-952D-E49AEC7BEC2F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-565: (0Day) Advantech WebAccess nvA1Media Connect MediaPassword Stack-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-565/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\E19E79EC-F62E-40A0-952D-E49AEC7BEC2F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-564: (0Day) Advantech WebAccess RtspVapgDecoderNew2 PMSettingData3D Name Heap-based Buffer Overflow远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-564/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-563: (0Day) Advantech WebAccess RtspVapgDecoderNew2 SetLangStringHex Out-of-bounds Access 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-563/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-562: (0Day) Advantech WebAccess RtspVapgDecoderNew2 PMSettingData3D Height Stack-based Buffer Overflow远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-562/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-561: (0Day) Advantech WebAccess TpMegaJVT setCameraName  Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-561/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\BF28239A-3823-40FF-BC02-2DA4D9DBB1EE

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-560: (0Day) Advantech WebAccess RtspVapgDecoderNew2 SetPaybackFilePath Stack-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-560/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-559: (0Day) Advantech WebAccess TpMegaJVT createStream  Heap-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-559/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\BF28239A-3823-40FF-BC02-2DA4D9DBB1EE

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797

ZDI-17-558: (0Day) Advantech WebAccess RtspVapgDecoderNew2 PMSettingData3D Width Stack-based Buffer Overflow 远程代码执行漏洞

http://www.zerodayinitiative.com/advisories/ZDI-17-558/

缓解措施:

The killbit can be set on this control to disable scripting within Internet Explorer by modifying the data value of the Compatibility Flags DWORD within the following location in the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\73888E2B-FF04-416c-8847-984D7FC4507F

If the Compatibility Flags value is set to 0x00000400, the control can no longer be instantiated inside the browser. 
For more information, please see: http://support.microsoft.com/kb/240797




原文发布时间:2017年8月8日 

本文由:zeroday发布,版权归属于原作者

原文链接:http://toutiao.secjia.com/advantech-webaccess-10-0day

本文来自云栖社区合作伙伴安全加,了解相关信息可以关注安全加网站

相关实践学习
DataV Board用户界面概览
本实验带领用户熟悉DataV Board这款可视化产品的用户界面
阿里云实时数仓实战 - 项目介绍及架构设计
课程简介 1)学习搭建一个数据仓库的过程,理解数据在整个数仓架构的从采集、存储、计算、输出、展示的整个业务流程。 2)整个数仓体系完全搭建在阿里云架构上,理解并学会运用各个服务组件,了解各个组件之间如何配合联动。 3 )前置知识要求   课程大纲 第一章 了解数据仓库概念 初步了解数据仓库是干什么的 第二章 按照企业开发的标准去搭建一个数据仓库 数据仓库的需求是什么 架构 怎么选型怎么购买服务器 第三章 数据生成模块 用户形成数据的一个准备 按照企业的标准,准备了十一张用户行为表 方便使用 第四章 采集模块的搭建 购买阿里云服务器 安装 JDK 安装 Flume 第五章 用户行为数据仓库 严格按照企业的标准开发 第六章 搭建业务数仓理论基础和对表的分类同步 第七章 业务数仓的搭建  业务行为数仓效果图  
相关文章
关于WinRAR代码执行漏洞的漏洞通报预警
关于WinRAR代码执行漏洞的漏洞通报预警
|
安全 Windows
14 向日葵远程RCE漏洞
向日葵是一款远控软件
14 向日葵远程RCE漏洞
|
SQL 安全 关系型数据库
ecshop 全系列版本通杀漏洞 远程代码执行sql注入漏洞
ecshop漏洞于2018年9月12日被某安全组织披露爆出,该漏洞受影响范围较广,ecshop2.73版本以及目前最新的3.0、3.6、4.0版本都受此次ecshop漏洞的影响,主要漏洞是利用远程代码执行sql注入语句漏洞,导致可以插入sql查询代码以及写入代码到网站服务器里,严重的可以直接获取服务器的管理员权限,甚至有些网站使用的是虚拟主机,可以直接获取网站ftp的权限,该漏洞POC已公开,使用简单,目前很多商城网站都被攻击,危害较大,针对于此我们SINE安全对该ECSHOP漏洞的详情以及如何修复网站的漏洞,及如何部署网站安全等方面进行详细的解读。
538 0
ecshop 全系列版本通杀漏洞 远程代码执行sql注入漏洞
|
XML Web App开发 安全
我如何发现Facebook服务器中的远程代码执行漏洞
大家好!首先我做一下自我介绍。我叫Reginaldo Silva,是一名巴西籍的计算机工程师。最近我的工作与信息安全有关,尤其是在Web应用程序安全性的方面。如果可以的话,我很乐意给大家演示如何入侵网站和应用程序。我的主页上有一些相关信息,欢迎大家浏览。
204 0
|
安全 应用服务中间件 网络安全
Struts2致命远程执行代码漏洞植入门罗币挖矿安装病毒解决方法
早期由于redis低版本发现远程可执行代码漏洞,导致被黑客植入挖矿木马,服务器沦为矿机。今年Struts2又出现该漏洞,一年前自己有用Struts2编写过一个网站,没想到今天被我遇到了,特地写文章记录一下。
2306 0
下一篇
无影云桌面