

The vulnerability is also documented in the vulnerability database at SecurityTracker ( ID 1019275). It may be suggested to replace the affected object with an alternative product. There is no information about possible countermeasures known. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment ( estimation calculated on ). Technical details are known, but there is no available exploit. No form of authentication is required for exploitation. This vulnerability is handled as CVE-2008-0176 since.

The weakness was published with CERT as confirmed advisory (). Heap-based buffer overflow in w32rtr.exe in GE Fanuc CIMPLICITY HMI SCADA system 7.0 before 7.0 SIM 9, and earlier versions before 6.1 SP6 Hot fix - 010708_162517_6106, allow remote attackers to execute arbitrary code via unknown vectors. Impacted is confidentiality, integrity, and availability. The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. It was originally introduced to Mac users in Mac OS 9. Using CWE to declare the problem leads to CWE-119. Apple Software Update is a software tool by Apple that installs the latest version of Apple software. The manipulation with an unknown input leads to a memory corruption vulnerability. Affected by this issue is an unknown code of the file w32rtr.exe. A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability was found in GE Fanuc CIMPLICITY 6.1 Sp6 Hf 010708 162517 6106/7.0 Sim8 and classified as very critical. The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.
