The specific API in TCBServiSign Windows Version from CHANGING Information Technology does does not properly validate the length of server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the TCBServiSign, temporarily disrupting its service.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-38587 The specific API in TCBServiSign Windows Version from CHANGING Information Technology does does not properly validate the length of server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the TCBServiSign, temporarily disrupting its service.
Fixes

Solution

Update to version 1.0.24.0318 or later.


Workaround

No workaround given by the vendor.

History

Fri, 09 Aug 2024 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Changingtec
Changingtec tcb Servisign
Weaknesses CWE-787
CPEs cpe:2.3:a:changingtec:tcb_servisign:*:*:*:*:*:windows:*:*
Vendors & Products Changingtec
Changingtec tcb Servisign

cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-08-02T14:02:50.759Z

Reserved: 2024-07-09T03:30:54.517Z

Link: CVE-2024-40722

cve-icon Vulnrichment

Updated: 2024-08-02T14:02:38.835Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-02T11:16:43.283

Modified: 2024-08-09T14:39:28.157

Link: CVE-2024-40722

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.