Description
The Firmware protocol configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
Related CPE's
References
https://www.asus.com/content/ASUS-Product-Security-Advisory/
https://www.asus.com/tw/support/callus/
https://www.twcert.org.tw/tw/cp-132-4568-627f7-1.html
https://www.asus.com/content/ASUS-Product-Security-Advisory/
https://www.asus.com/tw/support/callus/
https://www.twcert.org.tw/tw/cp-132-4568-627f7-1.html
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.9 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2021-04-06T03:15:16.503Z
4 years agoLast modified
2024-11-21T04:59:20.143Z
1 year ago