Advisory Details

July 12th, 2018

Eaton 9000XDrive TLF File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability

ZDI-18-608
ZDI-CAN-5669

CVE ID CVE-2018-8847
CVSS SCORE 6.8, AV:N/AC:M/Au:N/C:P/I:P/A:P
AFFECTED VENDORS Eaton
AFFECTED PRODUCTS 9000XDrive
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Eaton 9000XDrive. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the processing of a TLF file. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process.

ADDITIONAL DETAILS Eaton has issued an update to correct this vulnerability. More details can be found at:
https://ics-cert.us-cert.gov/advisories/ICSA-18-193-01
DISCLOSURE TIMELINE
  • 2018-02-23 - Vulnerability reported to vendor
  • 2018-07-12 - Coordinated public release of advisory
  • 2018-07-12 - Advisory Updated
CREDIT Ghirmay Desta
BACK TO ADVISORIES