A buffer overflow vulnerability in "Add command" functionality exists in Flexense SyncBreeze Enterprise <= 10.3.14. The vulnerability can be triggered by an authenticated attacker who submits more than 5000 characters as the command name. It will cause termination of the SyncBreeze Enterprise server and possibly remote command execution with SYSTEM privilege.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2018/Feb/10 | Exploit Mailing List Third Party Advisory |
http://www.ryantzj.com/flexense-syncbreeze-entreprise-10314-buffer-overflow-seh-bypass.html | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2018/Feb/10 | Exploit Mailing List Third Party Advisory |
http://www.ryantzj.com/flexense-syncbreeze-entreprise-10314-buffer-overflow-seh-bypass.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2018/Feb/10 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.ryantzj.com/flexense-syncbreeze-entreprise-10314-buffer-overflow-seh-bypass.html - Exploit, Third Party Advisory |
Information
Published : 2018-02-06 16:29
Updated : 2024-11-21 03:19
NVD link : CVE-2017-17996
Mitre link : CVE-2017-17996
CVE.ORG link : CVE-2017-17996
JSON object : View
Products Affected
flexense
- syncbreeze
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer