Flexense SyncBreeze Enterprise version 10.1.16 is vulnerable to a buffer overflow that can be exploited for arbitrary code execution. The flaw is triggered by providing a long input into the "Destination directory" field, either within an XML document or through use of passive mode.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162008/SyncBreeze-10.1.16-Buffer-Overflow.html | |
http://seclists.org/fulldisclosure/2017/Oct/64 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/162008/SyncBreeze-10.1.16-Buffer-Overflow.html | |
http://seclists.org/fulldisclosure/2017/Oct/64 | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/162008/SyncBreeze-10.1.16-Buffer-Overflow.html - | |
References | () http://seclists.org/fulldisclosure/2017/Oct/64 - Mailing List, Third Party Advisory |
Information
Published : 2017-10-31 14:29
Updated : 2024-11-21 03:15
NVD link : CVE-2017-15950
Mitre link : CVE-2017-15950
CVE.ORG link : CVE-2017-15950
JSON object : View
Products Affected
flexense
- syncbreeze
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer