CVE-2018-7886

An issue was discovered in CloudMe 1.11.0. An unauthenticated local attacker that can connect to the "CloudMe Sync" client application listening on 127.0.0.1 port 8888 can send a malicious payload causing a buffer overflow condition. This will result in code execution, as demonstrated by a TCP reverse shell, or a crash. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-6892.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:cloudme:sync:1.11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:12

Type Values Removed Values Added
References () https://0day4u.wordpress.com/2018/03/09/buffer-overflow-on-cloudme-sync-v1-11-0/ - Exploit, Third Party Advisory () https://0day4u.wordpress.com/2018/03/09/buffer-overflow-on-cloudme-sync-v1-11-0/ - Exploit, Third Party Advisory
References () https://www.exploit-db.com/exploits/44470/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/44470/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2018-03-15 02:29

Updated : 2024-11-21 04:12


NVD link : CVE-2018-7886

Mitre link : CVE-2018-7886

CVE.ORG link : CVE-2018-7886


JSON object : View

Products Affected

cloudme

  • sync
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer