The Active Directory configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
Solution:
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://www.asus.com/content/ASUS-Product-Security-Advisory/ | vendor advisory |
https://www.asus.com/tw/support/callus/ | vendor advisory |
https://www.twcert.org.tw/tw/cp-132-4554-10a74-1.html | third party advisory |