A vulnerability has been identified in COMOS V10.2 (All versions), COMOS V10.3.3.1 (All versions < V10.3.3.1.45), COMOS V10.3.3.2 (All versions < V10.3.3.2.33), COMOS V10.3.3.3 (All versions < V10.3.3.3.9), COMOS V10.3.3.4 (All versions < V10.3.3.4.6), COMOS V10.4.0.0 (All versions < V10.4.0.0.31), COMOS V10.4.1.0 (All versions < V10.4.1.0.32), COMOS V10.4.2.0 (All versions < V10.4.2.0.25). Cache validation service in COMOS is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-693110.pdf | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: siemens
Published: 2023-02-14T10:36:24.707Z
Updated: 2023-02-15T09:24:59.994Z
Reserved: 2023-01-24T13:52:15.873Z
Link: CVE-2023-24482
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-02-14T11:15:14.783
Modified: 2023-02-22T15:43:48.470
Link: CVE-2023-24482
JSON object: View
Redhat Information
No data.
CWE