Royal RoyalTSX before 6.0.2.1 allows attackers to cause a denial of service (Heap Memory Corruption and application crash) or possibly have unspecified other impact via a long hostname in an RTSZ file, if the victim clicks on Test Connection. This occurs during SecureGatewayHost object processing in RAPortCheck.createNWConnection.
References
Link | Resource |
---|---|
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5788.php | Third Party Advisory |
Configurations
History
10 Jan 2024, 20:58
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
First Time |
Royalapps
Royalapps royaltsx |
|
References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5788.php - Third Party Advisory | |
CPE | cpe:2.3:a:royalapps:royaltsx:*:*:*:*:*:macos:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
31 Dec 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-31 03:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-52277
Mitre link : CVE-2023-52277
CVE.ORG link : CVE-2023-52277
JSON object : View
Products Affected
royalapps
- royaltsx
CWE
CWE-787
Out-of-bounds Write