Impact
A local buffer overflow exists in the registration form of Amac: Mac Address Change version 5.4. By supplying 212 bytes of data in the 'Your Name', 'Your Company', or 'Register Code' fields, a local user can force the application to crash. The vulnerability leads to a denial of service but does not grant code execution or modify system state outside the application.
Affected Systems
The flaw affects the Mac Address Change application from Amac, specifically the 5.4 release series. No additional vendor or product details are disclosed, and version information beyond 5.4 is not provided.
Risk and Exploitability
The vulnerability receives a CVSS score of 6.8, indicating moderate severity. Exploit probability data is unavailable, and the issue is not listed as a known exploited vulnerability. Attack convergence appears limited to users with local access to the system running the application; an authenticated local attacker can trigger the crash by exploiting the oversized input. The impact is confined to application availability, with no evidence of persistence or privilege escalation.
OpenCVE Enrichment