VOICEYE WSActiveBridgeES versions prior to 2.1.0.3 contains a stack-based buffer overflow vulnerability caused by improper bound checking parameter given by attack. It finally leads to a stack-based buffer overflow via access to crafted web page.
References
Link | Resource |
---|---|
https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35922 | Third Party Advisory |
https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35922 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35922 - Third Party Advisory |
Information
Published : 2021-02-24 17:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7836
Mitre link : CVE-2020-7836
CVE.ORG link : CVE-2020-7836
JSON object : View
Products Affected
voiceye_wsactivebridgees_project
- voiceye_wsactivebridges