The specific API in TCBServiSign Windows Version from CHANGING Information Technology does does not properly validate the length of server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the TCBServiSign, temporarily disrupting its service.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-38587 | The specific API in TCBServiSign Windows Version from CHANGING Information Technology does does not properly validate the length of server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the TCBServiSign, temporarily disrupting its service. |
Fixes
Solution
Update to version 1.0.24.0318 or later.
Workaround
No workaround given by the vendor.
References
History
Fri, 09 Aug 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Changingtec
Changingtec tcb Servisign |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:changingtec:tcb_servisign:*:*:*:*:*:windows:*:* | |
| Vendors & Products |
Changingtec
Changingtec tcb Servisign |
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-08-02T14:02:50.759Z
Reserved: 2024-07-09T03:30:54.517Z
Link: CVE-2024-40722
Updated: 2024-08-02T14:02:38.835Z
Status : Analyzed
Published: 2024-08-02T11:16:43.283
Modified: 2024-08-09T14:39:28.157
Link: CVE-2024-40722
No data.
OpenCVE Enrichment
No data.
EUVD