Impact
SysGauge 4.5.18 contains a buffer overflow in the proxy configuration handler that can be triggered by a local attacker supplying an oversized string to the Proxy Server Host Name field in the Options menu. The overflow crashes the application and causes a denial of service. The primary impact is loss of availability for the affected system, with potential cascading effects if the application provides critical monitoring functions. The flaw corresponds to CWE-120, a buffer copy without checking the destination buffer size.
Affected Systems
The vulnerability exists in SysGauge version 4.5.18 released by Sysgauge. Only installations running that exact version are affected; other versions have not been reported to contain this specific buffer overflow.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity, and the EPSS score is not available, suggesting limited data on exploitation frequency. The flaw is local in nature and is not listed in the CISA KEV catalog, implying that it is not currently being actively exploited in the wild. However, the lack of remote access does not mitigate the risk if an attacker gains local access to an unprotected workstation. Overall risk remains moderate; timely patching is the most effective countermeasure.
OpenCVE Enrichment