CVE-2017-9544
Summary
| CVE | CVE-2017-9544 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-06-12 06:29:00 UTC |
| Updated | 2021-03-26 17:56:00 UTC |
| Description | There is a remote stack-based buffer overflow (SEH) in register.ghp in EFS Software Easy Chat Server versions 2.0 to 3.1. By sending an overly long username string to registresult.htm for registering the user, an attacker may be able to execute arbitrary code. |
Risk And Classification
Problem Types: CWE-787
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Echatserver | Easy Chat Server | All | All | All | All |
| Application | Efs Software | Easy Chat Server | 2.0 | All | All | All |
| Application | Efs Software | Easy Chat Server | 2.1 | All | All | All |
| Application | Efs Software | Easy Chat Server | 2.2 | All | All | All |
| Application | Efs Software | Easy Chat Server | 2.5 | All | All | All |
| Application | Efs Software | Easy Chat Server | 3.0 | All | All | All |
| Application | Efs Software | Easy Chat Server | 3.1 | All | All | All |
| Application | Efs Software | Easy Chat Server | 2.0 | All | All | All |
| Application | Efs Software | Easy Chat Server | 2.1 | All | All | All |
| Application | Efs Software | Easy Chat Server | 2.2 | All | All | All |
| Application | Efs Software | Easy Chat Server | 2.5 | All | All | All |
| Application | Efs Software | Easy Chat Server | 3.0 | All | All | All |
| Application | Efs Software | Easy Chat Server | 3.1 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| EFS Easy Chat Server 3.1 - Buffer Overflow (SEH) | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.