Impact
This vulnerability is a local buffer overflow that occurs when AnyBurn 4.3 processes an image file name during the "Copy disk to Image" operation. An attacker can supply an excessively long string—up to 10,000 bytes—into the image file name field, causing the application to crash. The flaw is a classic CWE‑787 overflow that leads to a denial of service. The impact is limited to the integrity of the application’s availability, not to remote control or data disclosure. The issue does not provide attacker privileges beyond the local user running the program.
Affected Systems
The affected product is AnyBurn version 4.3 from Anyburn. No other versions are listed in the CNA data, so the only explicitly vulnerable release is 4.3. No additional vendor or product information is supplied beyond this single version.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity, and the EPSS score is not provided, so the likelihood of exploitation is unknown. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local; an attacker needs the ability to run the AnyBurn application or otherwise supply a crafted image file name. Because the flaw causes an application crash, the consequence is restricted to service interruption and is recoverable by restarting the program. Recovery is mitigated by application restarts and system restarts. An unauthorized remote attacker would need to first gain local execution to exploit this weakness.
OpenCVE Enrichment