Article No° | Product Name | Affected Version(s) |
---|---|---|
PASvisu | < 1.14.1 | |
PIT Transponder Manager | < 1.2.0 | |
266807, 266812, 266815 | PMI v8xx | <= 2.0.33992 |
Several Pilz products use the 3rd-party component “libwebp” for decoding of images in WebP format. This component is affected by a vulnerability, which may enable an attacker to gain full control over the system running the software product. Depending on the affected product, the vulnerabilities can be exploited locally or over the network.
Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
Decoding of a specially crafted image leads to a heap buffer overflow. In a worst-case scenario, a successful exploitation of the vulnerability can lead to execution of arbitrary code using the privileges of the user running the affected software. In case of PIT Transponder Manager and the PASvisu Builder, the vulnerability can only be exploited locally. Depending on the configuration of the PASvisu Runtime, a remote exploitation may be possible.
General Countermeasures
Product-specific Countermeasures
Pilz would like to thank CERT@VDE for coordinating publication.