The vulnerability function is enabled when the streamer service related to the AfreecaTV communicated through web socket using 21201 port. A stack-based buffer overflow leading to remote code execution was discovered in strcpy() operate by "FanTicket" field. It is because of stored data without validation of length.
References
Link | Resource |
---|---|
https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36357 | Third Party Advisory |
https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36357 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 7.5 |
References | () https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36357 - Third Party Advisory |
Information
Published : 2021-11-26 17:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7881
Mitre link : CVE-2020-7881
CVE.ORG link : CVE-2020-7881
JSON object : View
Products Affected
afreecatv
- afreecatv
microsoft
- windows