Share: Email | Twitter

ID

VDE-2024-003

Published

2024-01-23 08:00 (CET)

Last update

2024-01-22 15:32 (CET)

Vendor(s)

TRUMPF Werkzeugmaschinen SE + Co. KG

Product(s)

Article No° Product Name Affected Version(s)
Oseon <= V3.0.24
TruTops Fab (Storage) <= V22.7

Summary

The TRUMPF products that are listed above contain a vulnerable version of Notepad++. This version is
being installed for support purposes only, so there is no danger of triggering this vulnerability in
Notepad++ during normal operations. Nevertheless, TRUMPF recommends mitigation of this
vulnerability.
When editing a specially crafted file containing UTF-8 characters in Notepad++ (Versions up to 8.5.6) and converting that file to UTF-16, a buffer overflow vulnerability can be exploited that allows an attacker to execute arbitrary code to take over the whole system.

Vulnerabilities



Last Update
Aug. 30, 2024, 9:09 a.m.
Weakness
Heap-based Buffer Overflow (CWE-122)
Summary

Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to heap buffer write overflow in `Utf8_16_Read::convert`. This issue may lead to arbitrary code execution. As of time of publication, no known patches are available in existing versions of Notepad++.

Last Update
Aug. 30, 2024, 9:09 a.m.
Weakness
Heap-based Buffer Overflow (CWE-122)
Summary

Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to heap buffer read overflow in `FileManager::detectLanguageFromTextBegining `. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++.

Last Update
Aug. 30, 2024, 9:09 a.m.
Weakness
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE-120)
Summary

Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to global buffer read overflow in `nsCodingStateMachine::NextStater`. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++.

Last Update
Aug. 30, 2024, 9:09 a.m.
Weakness
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE-120)
Summary

Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to global buffer read overflow in `CharDistributionAnalysis::HandleOneChar`. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++.

Impact

A user who’s editing and converting a specially crafted file using the vulnerable Notepad++ version in
the TRUMPF product listed above can allow an attacker to execute code on the local server. This can
impact confidentiality, integrity and availability of information on the affected system.

Solution

Mitigation

For additional questions please contact your TRUMPF Service with the PR number 501709.

Remediation

Please download the replacement tool (LINK).

Reported by

CERT@VDE coordinated with TRUMPF