An issue was discovered in EFS Easy Chat Server 3.1. There is a buffer overflow via a long body2.ghp message parameter.
References
Link | Resource |
---|---|
https://github.com/s1kr10s/EasyChatServer-DOS | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-03-05 12:15
Updated : 2020-03-06 07:17
NVD link : CVE-2019-20502
Mitre link : CVE-2019-20502
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
echatserver
- easy_chat_server