UniSign 2.0.4.0 and earlier version contains a stack-based buffer overflow vulnerability which can overwrite the stack with arbitrary data, due to a buffer overflow in a library. That leads remote attacker to execute arbitrary code via crafted https packets.
References
Link | Resource |
---|---|
https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35111 | Third Party Advisory VDB Entry |
https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35111 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35111 - Third Party Advisory, VDB Entry |
Information
Published : 2019-08-13 20:15
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12806
Mitre link : CVE-2019-12806
CVE.ORG link : CVE-2019-12806
JSON object : View
Products Affected
crosscert
- unisign
microsoft
- windows