There is a remote stack-based buffer overflow (SEH) in register.ghp in EFS Software Easy Chat Server versions 2.0 to 3.1. By sending an overly long username string to registresult.htm for registering the user, an attacker may be able to execute arbitrary code.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/42155/ | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-06-11 23:29
Updated : 2021-03-26 10:56
NVD link : CVE-2017-9544
Mitre link : CVE-2017-9544
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
echatserver
- easy_chat_server