There is a remote stack-based buffer overflow (SEH) in register.ghp in EFS Software Easy Chat Server versions 2.0 to 3.1. By sending an overly long username string to registresult.htm for registering the user, an attacker may be able to execute arbitrary code.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/42155/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/42155/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.exploit-db.com/exploits/42155/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2017-06-12 06:29
Updated : 2024-11-21 03:36
NVD link : CVE-2017-9544
Mitre link : CVE-2017-9544
CVE.ORG link : CVE-2017-9544
JSON object : View
Products Affected
echatserver
- easy_chat_server
CWE
CWE-787
Out-of-bounds Write