UniSign 2.0.4.0 and earlier version contains a stack-based buffer overflow vulnerability which can overwrite the stack with arbitrary data, due to a buffer overflow in a library. That leads remote attacker to execute arbitrary code via crafted https packets.
References
| Link | Resource |
|---|---|
| https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35111 | Third Party Advisory VDB Entry |
| https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35111 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 04:23
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35111 - Third Party Advisory, VDB Entry |
Information
Published : 2019-08-13 20:15
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12806
Mitre link : CVE-2019-12806
CVE.ORG link : CVE-2019-12806
JSON object : View
Products Affected
microsoft
- windows
crosscert
- unisign
