Impact
TaskInfo application version 8.2.0.280 contains a local buffer overflow that allows an attacker to crash the program by entering oversized strings into the New User Name or New Serial Number fields of the registration dialog. This overflow results in a denial of service by terminating the application, but does not provide remote code execution or data exfiltration capabilities. The weakness is classed as a Heap or Stack-based Buffer Overflow (CWE-787).
Affected Systems
The vulnerability affects the Iarsn TaskInfo product, specifically version 8.2.0.280. No other product versions or vendors are listed as affected in the available data.
Risk and Exploitability
The CVSS score of 6.9 reflects a moderate to high impact risk. EPSS information is not provided, and the vulnerability is not present in the CISA KEV catalog. It is a local vulnerability; an attacker must have access to the machine to supply long input through the graphical user interface. Exploitation requires no special authentication beyond local user privileges, and the attack vector is inferred from the description to be local.
OpenCVE Enrichment