An issue was discovered in WinAPRS 2.9.0. A buffer overflow in national.txt processing allows a local attacker to cause a denial of service or possibly achieve code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
| Link | Resource |
|---|---|
| https://winaprs.com/ | Product |
| https://www.coalfire.com/the-coalfire-blog/hacking-ham-radio-winaprs-part1 | Exploit Third Party Advisory |
| https://winaprs.com/ | Product |
| https://www.coalfire.com/the-coalfire-blog/hacking-ham-radio-winaprs-part1 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://winaprs.com/ - Product | |
| References | () https://www.coalfire.com/the-coalfire-blog/hacking-ham-radio-winaprs-part1 - Exploit, Third Party Advisory |
Information
Published : 2022-06-02 14:15
Updated : 2024-11-21 06:50
NVD link : CVE-2022-24701
Mitre link : CVE-2022-24701
CVE.ORG link : CVE-2022-24701
JSON object : View
Products Affected
winaprs
- winaprs
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
