Impact
Angry IP Scanner 3.5.3 contains a buffer overflow in its preferences dialog. When a user pastes an excessively large string into the ‘unavailable value’ field, the application reads beyond the allocated buffer, causing the program to crash. This overflow is a local denial‑of‑service vulnerability that disrupts normal use of Angry IP Scanner but does not provide access to data or compromise system integrity. The weakness is catalogued as CWE‑787.
Affected Systems
The flaw is limited to version 3.5.3 of Angry IP Scanner, a network scanning utility provided by Angryip. Earlier versions are not mentioned as affected, and the CVE does not list additional affected releases. Therefore, only installations of 3.5.3 are directly vulnerable.
Risk and Exploitability
The CVSS score of 6.9 classifies the issue as medium severity, and the EPSS metric is not available. The vulnerability requires local user interaction to supply the oversized preference string; it does not allow remote exploitation or privilege escalation. Because the flaw’s impact is a crash of the application rather than data loss or unauthorized access, the overall risk is considered limited to individual users who run Angry IP Scanner, and the likelihood of widespread damage is low. The vulnerability is not listed in CISA's KEV catalog, which further indicates that no public exploitation activity has been documented.
OpenCVE Enrichment