Description
The specific function in ASUS BMC’s firmware Web management page (Audit log configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
Related CPE's
References
https://www.asus.com/content/ASUS-Product-Security-Advisory/
https://www.asus.com/tw/support/callus/
https://www.twcert.org.tw/tw/cp-132-4550-5ee8c-1.html
https://www.asus.com/content/ASUS-Product-Security-Advisory/
https://www.asus.com/tw/support/callus/
https://www.twcert.org.tw/tw/cp-132-4550-5ee8c-1.html
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.9 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2021-04-06T03:15:14.987Z
4 years agoLast modified
2024-11-21T04:59:16.287Z
1 year ago