Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cp8j-5593-5j34

Опубликовано: 23 дек. 2021
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

Stack-based buffer overflow vulnerability exists in how the CMA readfile function of Garrett Metal Detectors iC Module CMA Version 5.0 is used at various locations. The Garrett iC Module exposes an authenticated CLI over TCP port 6877. This interface is used by a secondary GUI client, called “CMA Connect”, to interact with the iC Module on behalf of the user. Every time a user submits a password to the CLI password prompt, the buffer containing their input is passed as the password parameter to the checkPassword function.

Stack-based buffer overflow vulnerability exists in how the CMA readfile function of Garrett Metal Detectors iC Module CMA Version 5.0 is used at various locations. The Garrett iC Module exposes an authenticated CLI over TCP port 6877. This interface is used by a secondary GUI client, called “CMA Connect”, to interact with the iC Module on behalf of the user. Every time a user submits a password to the CLI password prompt, the buffer containing their input is passed as the password parameter to the checkPassword function.

EPSS

Процентиль: 51%
0.00283
Низкий

7.2 High

CVSS3

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 7.2
nvd
около 4 лет назад

Stack-based buffer overflow vulnerability exists in how the CMA readfile function of Garrett Metal Detectors iC Module CMA Version 5.0 is used at various locations. The Garrett iC Module exposes an authenticated CLI over TCP port 6877. This interface is used by a secondary GUI client, called “CMA Connect”, to interact with the iC Module on behalf of the user. Every time a user submits a password to the CLI password prompt, the buffer containing their input is passed as the password parameter to the checkPassword function.

EPSS

Процентиль: 51%
0.00283
Низкий

7.2 High

CVSS3

Дефекты

CWE-787