Executive Summary
Summary | |
---|---|
Title | Up.time agent for Windows contains multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | VU#377260 | First vendor Publication | 2015-12-08 |
Vendor | VU-CERT | Last vendor Modification | 2015-12-08 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#377260Up.time agent for Windows contains multiple vulnerabilitiesOverviewThe Up.time client for Windows is vulnerable to an format string attack as well as a buffer overflow, and may allow unauthenticated users to perform certain commands. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditThanks to Matthew Benton and Richard Kelley for reporting this issue to us. This document was written by Garret Wassermann. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/377260 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-200 | Information Exposure |
33 % | CWE-134 | Uncontrolled Format String (CWE/SANS Top 25) |
33 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Alert History
Date | Informations |
---|---|
2016-06-29 01:31:21 |
|
2016-01-01 00:28:01 |
|
2015-12-31 09:27:32 |
|
2015-12-08 17:23:28 |
|