Description
Stack-based buffer overflow vulnerability in Easy Chat Server 3.1 version. An attacker could send an excessively long username string to the register.ghp file asking for the name via a GET request resulting in arbitrary code execution on the remote machine.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-54349 | Stack-based buffer overflow vulnerability in Easy Chat Server 3.1 version. An attacker could send an excessively long username string to the register.ghp file asking for the name via a GET request resulting in arbitrary code execution on the remote machine. |
References
History
No history.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-09-05T18:09:39.518Z
Reserved: 2023-08-23T09:39:39.085Z
Link: CVE-2023-4494
Updated: 2024-08-02T07:31:05.896Z
Status : Modified
Published: 2023-10-04T13:15:26.057
Modified: 2024-11-21T08:35:17.113
Link: CVE-2023-4494
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD