Mz-automation

Libiec61850

36 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.34%
  • Veröffentlicht 23.09.2022 16:15:10
  • Zuletzt bearbeitet 21.11.2024 07:02:00

MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) is vulnerable to a stack-based buffer overflow, which could allow an attacker to crash the device or remotely execute arbitrary...

  • EPSS 0.12%
  • Veröffentlicht 23.09.2022 16:15:10
  • Zuletzt bearbeitet 21.11.2024 07:02:00

MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) accesses a resource using an incompatible type, which could allow an attacker to crash the server with a malicious payload.

  • EPSS 0.29%
  • Veröffentlicht 23.09.2022 16:15:10
  • Zuletzt bearbeitet 21.11.2024 07:02:00

MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) does not sanitize input before memcpy is used, which could allow an attacker to crash the device or remotely execute arbitrary ...

Exploit
  • EPSS 0.45%
  • Veröffentlicht 15.04.2022 16:15:07
  • Zuletzt bearbeitet 21.11.2024 06:44:00

A denial of service vulnerability exists in the parseNormalModeParameters functionality of MZ Automation GmbH libiec61850 1.5.0. A specially-crafted series of network requests can lead to denial of service. An attacker can send a sequence of malforme...

  • EPSS 0.98%
  • Veröffentlicht 12.04.2022 08:15:06
  • Zuletzt bearbeitet 21.11.2024 06:40:27

In the MZ Automation LibIEC61850 in versions prior to 1.5.1 an unauthenticated attacker can craft a goose message, which may result in a denial of service.

Exploit
  • EPSS 0.28%
  • Veröffentlicht 14.01.2022 20:15:15
  • Zuletzt bearbeitet 21.11.2024 06:33:01

A NULL pointer dereference in AcseConnection_parseMessage at src/mms/iso_acse/acse.c of libiec61850 v1.5.0 can lead to a segmentation fault or application crash.

  • EPSS 2.38%
  • Veröffentlicht 26.08.2020 18:15:10
  • Zuletzt bearbeitet 21.11.2024 05:04:58

In libIEC61850 before version 1.4.3, when a message with COTP message length field with value < 4 is received an integer underflow will happen leading to heap buffer overflow. This can cause an application crash or on some platforms even the executio...

Exploit
  • EPSS 0.66%
  • Veröffentlicht 14.01.2020 21:15:16
  • Zuletzt bearbeitet 21.11.2024 05:36:34

MmsValue_decodeMmsData in mms/iso_mms/server/mms_access_result.c in libIEC61850 through 1.4.0 has a heap-based buffer overflow when parsing the MMS_BIT_STRING data type.

Exploit
  • EPSS 0.43%
  • Veröffentlicht 24.12.2019 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:35:44

In libIEC61850 1.4.0, StringUtils_createStringFromBuffer in common/string_utilities.c has an integer signedness issue that could lead to an attempted excessive memory allocation and denial of service.

Exploit
  • EPSS 0.43%
  • Veröffentlicht 24.12.2019 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:35:44

In libIEC61850 1.4.0, getNumberOfElements in mms/iso_mms/server/mms_access_result.c has an out-of-bounds read vulnerability, related to bufPos and elementLength.