The specific API in TCBServiSign Windows Version from CHANGING Information Technology does does not properly validate the length of server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the TCBServiSign, temporarily disrupting its service.
Metrics
Affected Vendors & Products
References
History
Fri, 09 Aug 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Changingtec
Changingtec tcb Servisign |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:a:changingtec:tcb_servisign:*:*:*:*:*:windows:*:* | |
Vendors & Products |
Changingtec
Changingtec tcb Servisign |
MITRE
Status: PUBLISHED
Assigner: twcert
Published: 2024-08-02T10:18:36.629Z
Updated: 2024-08-02T14:02:50.759Z
Reserved: 2024-07-09T03:30:54.517Z
Link: CVE-2024-40722
Vulnrichment
Updated: 2024-08-02T14:02:38.835Z
NVD
Status : Analyzed
Published: 2024-08-02T11:16:43.283
Modified: 2024-08-09T14:39:28.157
Link: CVE-2024-40722
Redhat
No data.