An integer conversion vulnerability exists in the SORBAx64.dll RecvPacket functionality of WellinTech KingHistorian 35.01.00.05. A specially crafted network packet can lead to a buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1674 | Exploit Third Party Advisory |
Configurations
History
06 Jul 2023, 14:40
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-681 |
23 Mar 2023, 19:23
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-704 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2022-1674 - Exploit, Third Party Advisory | |
First Time |
Wellintech
Wellintech kinghistorian |
|
CPE | cpe:2.3:a:wellintech:kinghistorian:35.01.00.05:*:*:*:*:*:*:* |
20 Mar 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-20 21:15
Updated : 2023-12-10 15:01
NVD link : CVE-2022-43663
Mitre link : CVE-2022-43663
CVE.ORG link : CVE-2022-43663
JSON object : View
Products Affected
wellintech
- kinghistorian