[Japanese]

JVNDB-2022-002537

Stack-based buffer overflow vulnerability in Yokogawa Test & Measurement WTViewerE

Overview

WTViewerE provided by Yokogawa Test & Measurement Corporation contains a stack-based buffer overflow vulnerability (CWE-121).

Michael Heinzl reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 5.3 (Medium) [Other]
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: Low
  • Integrity Impact: Low
  • Availability Impact: Low
Affected Products


Yokogawa Test & Measurement Corporation
  • WTViewerE 761941 from 1.31 to 1.61
  • WTViewerEfree from 1.01 to 1.52

For more information, refer to the information provided by the developer.
Impact

Processing a long file name may cause the product to crash.

This analysis assumes that the user is led to input a long filename to the affected product.
Solution

[Update the software]
Update the software to the latest version according to the information provided by the developer.
The developer has released the versions below that contain a fix for this vulnerability

* WTViewerE 761941
1.62

* WTViewerEfree
1.53

Vendor Information

Yokogawa Test & Measurement Corporation
CWE (What is CWE?)

  1. Stack-based Buffer Overflow(CWE-121) [Other]
CVE (What is CVE?)

  1. CVE-2022-40984
References

  1. JVN : JVNVU#99955870
Revision History

  • [2022/10/19]
      Web page was published