Description
Buffer overflow vulnerability in Easy Address Book Web Server 1.6 version. The exploitation of this vulnerability could allow an attacker to send a very long username string to /searchbook.ghp, asking for the name via a POST request, resulting in arbitrary code execution on the remote machine.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-54346 | Buffer overflow vulnerability in Easy Address Book Web Server 1.6 version. The exploitation of this vulnerability could allow an attacker to send a very long username string to /searchbook.ghp, asking for the name via a POST request, resulting in arbitrary code execution on the remote machine. |
References
History
No history.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-09-05T18:11:41.806Z
Reserved: 2023-08-23T09:39:24.308Z
Link: CVE-2023-4491
Updated: 2024-08-02T07:31:06.045Z
Status : Modified
Published: 2023-10-04T13:15:25.823
Modified: 2024-11-21T08:35:16.687
Link: CVE-2023-4491
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD