Vulnerability Description
An issue was discovered in Fatek Automation PLC WinProladder Version 3.11 Build 14701. A stack-based buffer overflow vulnerability exists when the software application connects to a malicious server, resulting in a stack buffer overflow. This causes an exploitable Structured Exception Handler (SEH) overwrite condition that may allow remote code execution.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fatek | Plc Winproladder Firmware | 3.11 |
| Fatek | Plc Winproladder | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/94938Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-16-350-01Third Party AdvisoryUS Government Resource
- https://www.exploit-db.com/exploits/42700/Third Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/94938Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-16-350-01Third Party AdvisoryUS Government Resource
- https://www.exploit-db.com/exploits/42700/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2016-8377?
CVE-2016-8377 is a vulnerability with a CVSS score of 8.0 (HIGH). An issue was discovered in Fatek Automation PLC WinProladder Version 3.11 Build 14701. A stack-based buffer overflow vulnerability exists when the software application connects to a malicious server, ...
How severe is CVE-2016-8377?
CVE-2016-8377 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-8377?
Check the references section above for vendor advisories and patch information. Affected products include: Fatek Plc Winproladder Firmware, Fatek Plc Winproladder.