Description
The specific API in TCBServiSign Windows Version from CHANGING Information Technology does does not properly validate the length of server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the TCBServiSign, temporarily disrupting its service.
No analysis available yet.
Remediation
Vendor Solution
Update to version 1.0.24.0318 or later.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-38587 | The specific API in TCBServiSign Windows Version from CHANGING Information Technology does does not properly validate the length of server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the TCBServiSign, temporarily disrupting its service. |
References
History
Fri, 09 Aug 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Changingtec
Changingtec tcb Servisign |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:changingtec:tcb_servisign:*:*:*:*:*:windows:*:* | |
| Vendors & Products |
Changingtec
Changingtec tcb Servisign |
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-08-02T14:02:50.759Z
Reserved: 2024-07-09T03:30:54.517Z
Link: CVE-2024-40722
Updated: 2024-08-02T14:02:38.835Z
Status : Analyzed
Published: 2024-08-02T11:16:43.283
Modified: 2024-08-09T14:39:28.157
Link: CVE-2024-40722
No data.
OpenCVE Enrichment
No data.
EUVD