There is a remote stack-based buffer overflow (SEH) in register.ghp in EFS Software Easy Chat Server versions 2.0 to 3.1. By sending an overly long username string to registresult.htm for registering the user, an attacker may be able to execute arbitrary code.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/42155/ | Exploit Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-06-12T06:00:00
Updated: 2017-06-12T05:57:01
Reserved: 2017-06-11T00:00:00
Link: CVE-2017-9544
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-06-12T06:29:00.557
Modified: 2021-03-26T17:56:46.023
Link: CVE-2017-9544
JSON object: View
Redhat Information
No data.
CWE