The NHI card’s web service component has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A local area network attacker with general user privilege can exploit this vulnerability to execute arbitrary code, manipulate system command or disrupt service.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-38109 | The NHI card’s web service component has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A local area network attacker with general user privilege can exploit this vulnerability to execute arbitrary code, manipulate system command or disrupt service. |
Fixes
Solution
Download the latest version
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-6353-31470-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-16T20:53:13.282Z
Reserved: 2022-07-05T00:00:00.000Z
Link: CVE-2022-35217
No data.
Status : Modified
Published: 2022-08-02T16:15:10.243
Modified: 2024-11-21T07:10:54.750
Link: CVE-2022-35217
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD