There is a remote stack-based buffer overflow (SEH) in register.ghp in EFS Software Easy Chat Server versions 2.0 to 3.1. By sending an overly long username string to registresult.htm for registering the user, an attacker may be able to execute arbitrary code.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/42155/ | third party advisory vdb entry exploit |