Описание
Royal RoyalTSX before 6.0.2.1 allows attackers to cause a denial of service (Heap Memory Corruption and application crash) or possibly have unspecified other impact via a long hostname in an RTSZ file, if the victim clicks on Test Connection. This occurs during SecureGatewayHost object processing in RAPortCheck.createNWConnection.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 6.0.2.1 (исключая)
cpe:2.3:a:royalapps:royaltsx:*:*:*:*:*:macos:*:*
EPSS
Процентиль: 11%
0.00037
Низкий
7.8 High
CVSS3
Дефекты
CWE-787
Связанные уязвимости
CVSS3: 7.8
github
около 2 лет назад
Royal RoyalTSX before 6.0.2.1 allows attackers to cause a denial of service (Heap Memory Corruption and application crash) or possibly have unspecified other impact via a long hostname in an RTSZ file, if the victim clicks on Test Connection. This occurs during SecureGatewayHost object processing in RAPortCheck.createNWConnection.
EPSS
Процентиль: 11%
0.00037
Низкий
7.8 High
CVSS3
Дефекты
CWE-787