NHI’s health insurance web service component has insufficient validation for input string length, which can result in heap-based buffer overflow attack. A remote attacker can exploit this vulnerability to flood the memory space reserved for the program, in order to terminate service without authentication, which requires a system restart to recover service.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-32633 | NHI’s health insurance web service component has insufficient validation for input string length, which can result in heap-based buffer overflow attack. A remote attacker can exploit this vulnerability to flood the memory space reserved for the program, in order to terminate service without authentication, which requires a system restart to recover service. |
Fixes
Solution
Download last version
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-6227-eaf49-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-17T04:04:01.665Z
Reserved: 2021-12-29T00:00:00
Link: CVE-2021-45918
No data.
Status : Modified
Published: 2022-06-20T06:15:08.503
Modified: 2024-11-21T06:33:16.403
Link: CVE-2021-45918
No data.
OpenCVE Enrichment
No data.
EUVD