Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wwww-2qvw-46wq

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A flaw in Trading Technologies Messaging 7.1.28.3 (ttmd.exe) relates to invalid parameter handling when calling strcpy_s() with an invalid parameter (i.e., a long src string parameter) as a part of processing a type 4 message sent to default TCP RequestPort 10200. It's been observed that ttmd.exe terminates as a result.

A flaw in Trading Technologies Messaging 7.1.28.3 (ttmd.exe) relates to invalid parameter handling when calling strcpy_s() with an invalid parameter (i.e., a long src string parameter) as a part of processing a type 4 message sent to default TCP RequestPort 10200. It's been observed that ttmd.exe terminates as a result.

EPSS

Процентиль: 56%
0.00334
Низкий

Связанные уязвимости

CVSS3: 7.5
nvd
больше 5 лет назад

A flaw in Trading Technologies Messaging 7.1.28.3 (ttmd.exe) relates to invalid parameter handling when calling strcpy_s() with an invalid parameter (i.e., a long src string parameter) as a part of processing a type 4 message sent to default TCP RequestPort 10200. It's been observed that ttmd.exe terminates as a result.

EPSS

Процентиль: 56%
0.00334
Низкий