cve/2023/CVE-2023-28506.md

20 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-28506](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28506)
![](https://img.shields.io/static/v1?label=Product&message=UniData&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=UniVerse&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2011.3.5.1001%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%208.2.43.3003%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brighgreen)
### Description
Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a stack-based buffer overflow, where a string is copied into a buffer using a memcpy-like function and a user-provided length. This requires a valid login to exploit.
### POC
#### Reference
- https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
#### Github
No PoCs found on GitHub currently.