Summary
Several Pilz products use the 3rd-party component 'libwebp' for decoding of images in WebP format. This component is affected by a vulnerability, which may enable an attacker to gain full control over the system running the software product. Depending on the affected product, the vulnerabilities can be exploited locally or over the network.
Impact
Decoding of a specially crafted image leads to a heap buffer overflow. In a worst-case scenario, a successful exploitation of the vulnerability can lead to execution of arbitrary code using the privileges of the user running the affected software. In case of PIT Transponder Manager and the PASvisu Builder, the vulnerability can only be exploited locally. Depending on the configuration of the PASvisu Runtime, a remote exploitation may be possible.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
PASvisu < 1.14.1 | PASvisu < 1.14.1 | |
PIT Transponder Manager < 1.2.0 | PIT Transponder Manager < 1.2.0 | |
266807, 266812, 266815 | PMI v8xx <= 2.0.33992 | PMI v8xx <= 2.0.33992 |
Vulnerabilities
Expand / Collapse allHeap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
Remediation
Install the fixed product version as soon as it is available. Please visit the Pilz eShop(https://www.pilz.com/en-INT/eshop) to check for the fixed version.
PASvisu Runtime: Limit network access to legitimate connections by using a firewall or similarmeasures. Restrict administrative access by setting up user authentication properly.
Revision History
Version | Date | Summary |
---|---|---|
1 | 05.12.2023 08:00 | Initial revision. |
2 | 22.05.2025 15:03 | Fix: quotation mark |