2 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

An issue was discovered in CloudMe 1.11.0. An unauthenticated local attacker that can connect to the "CloudMe Sync" client application listening on 127.0.0.1 port 8888 can send a malicious payload causing a buffer overflow condition. This will result in code execution, as demonstrated by a TCP reverse shell, or a crash. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-6892. Se ha descubierto un problema en CloudMe 1.11.0. • https://www.exploit-db.com/exploits/44470 https://0day4u.wordpress.com/2018/03/09/buffer-overflow-on-cloudme-sync-v1-11-0 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 97%CPEs: 1EXPL: 8

An issue was discovered in CloudMe before 1.11.0. An unauthenticated remote attacker that can connect to the "CloudMe Sync" client application listening on port 8888 can send a malicious payload causing a buffer overflow condition. This will result in an attacker controlling the program's execution flow and allowing arbitrary code execution. Se ha descubierto un problema en versiones anteriores a la 1.11.0 de CloudMe. Un atacante remoto no autenticado que se pueda conectar a la aplicación cliente "CloudMe Sync" que escucha en el puerto 8888 puede enviar un payload malicioso que provoque una condición de desbordamiento de búfer. • https://www.exploit-db.com/exploits/44027 https://www.exploit-db.com/exploits/44175 https://www.exploit-db.com/exploits/45197 https://www.exploit-db.com/exploits/46250 https://github.com/latortuga71/CVE-2018-6892-Golang http://hyp3rlinx.altervista.org/advisories/CLOUDME-SYNC-UNAUTHENTICATED-REMOTE-BUFFER-OVERFLOW.txt http://packetstormsecurity.com/files/157407/CloudMe-1.11.2-Buffer-Overflow.html http://packetstormsecurity.com/files/158716/CloudMe-1.11.2-SEH-Buffer-Overflow.html http://packet • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •