大家好,我是你的好朋友思创斯。今天说一说台达plc编程软件最新版本_台达plc软件找不到plc,希望您对编程的造诣更进一步.
台达plc编程软件pmsoft和wplsoft爆出11个0day漏洞,美国ics-cert已经获知漏洞情况,台达,这些0day漏洞经过120天后,没有看到台达发布补丁,相关信息被公开。
台达是工业自动化厂商
据其金沙1005官网资料显示
台达是全球电源管理及散热方案的领导厂商,二十多年来,目前共设有广东东莞、江苏吴江、安徽芜湖、湖南郴州四个主要生产基地;二十三个研发中心 (超过3,000名研发工程师)、49 个运营网点、73个服务网点,员工总数达5万余人。台达中国区2016年的营收超过397亿人民币。
台达plc编程软件pmsoft 0day漏洞列表
(0day) delta industrial automation pmsoft project file parsing stack-based buffer overflow remote code execution vulnerability
漏洞描述:
this vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of delta industrial automation pmsoft. user interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
the specific flaw exists within parsing of information for a ttreeview object in a new-format ppm project file. the issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. an attacker can leverage this vulnerability to execute arbitrary code under the context of the current process.
缓解办法
given the nature of the vulnerability the only salient mitigation strategy is to restrict interaction with the application to trusted files.
(0day) delta industrial automation pmsoft project file parsing stack-based buffer overflow remote code execution vulnerability
漏洞描述:
this vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of delta industrial automation pmsoft. user interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
the specific flaw exists within parsing of information for a ttreeview object in a ppm project file. the issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. an attacker can leverage this vulnerability to execute arbitrary code under the context of the current process.
缓解办法
given the nature of the vulnerability the only salient mitigation strategy is to restrict interaction with the application to trusted files.
台达plc编程软件wplsoft 0day漏洞列表
由于内容较多,请参加直接查看
http://www.zerodayinitiative.com/advisories/published/
原文发布时间:2017年8月25日
本文由:zeroday发布,js555888金沙老品牌的版权归属于原作者
原文链接:http://toutiao.secjia.com/deltaww-pmsoft-wplsoft-0day#
本文来自云栖社区金沙1005的合作伙伴安全加,了解相关信息可以关注安全加网站
文章由思创斯整理,转载请注明出处:https://ispacesoft.com/123802.html