Description
The specific API in TCBServiSign Windows Version from CHANGING Information Technology does does not properly validate the length of server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the TCBServiSign, temporarily disrupting its service.
References
https://www.twcert.org.tw/en/cp-139-7973-e10c6-2.html
Third Party Advisory
https://www.twcert.org.tw/tw/cp-132-7967-9efdf-1.html
Third Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 · Medium
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2024-08-02T11:16:43.283
2 months agoLast modified
2024-08-09T14:39:28.157
2 months ago