// For flags

CVE-2023-4494

Easy Chat Server Stack-based buffer overflow vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Stack-based buffer overflow vulnerability in Easy Chat Server 3.1 version. An attacker could send an excessively long username string to the register.ghp file asking for the name via a GET request resulting in arbitrary code execution on the remote machine.

Vulnerabilidad de desbordamiento del búfer en la versión 3.1 de Easy Chat Server. Un atacante podría enviar un nombre de usuario excesivamente largo al archivo register.ghp solicitando el nombre mediante una solicitud GET, lo que provocaría la ejecución de código arbitrario en la máquina remota.

Easy Address Book Web Server version 1.6 suffers from buffer overflow and cross site scripting vulnerabilities.

*Credits: Rafael Pedrero
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-08-23 CVE Reserved
  • 2023-08-31 CVE Published
  • 2024-09-05 CVE Updated
  • 2024-10-10 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Easy Chat Server Project
Search vendor "Easy Chat Server Project"
Easy Chat Server
Search vendor "Easy Chat Server Project" for product "Easy Chat Server"
3.1
Search vendor "Easy Chat Server Project" for product "Easy Chat Server" and version "3.1"
-
Affected