Overview
The Up.time client for Windows is vulnerable to an format string attack as well as a buffer overflow, and may allow unauthenticated users to perform certain commands.
Description
CWE-134: Uncontrolled Format String - CVE-2015-2894 For version 6.0 and 7.2, an unauthenticated attacker on the network may send either the "%n" or "%s" format parameters will cause the application to crash. This vulnerability was addressed in version 7.6. |
Impact
A remote unauthenticated user may be able to perform a denial of service on Up.time, or obtain system information for future use. It may also be possible to execute code. |
Solution
Apply an update |
Check configuration |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 6.4 | AV:N/AC:L/Au:N/C:N/I:P/A:P |
Temporal | 5.5 | E:POC/RL:U/RC:UR |
Environmental | 4.1 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Matthew Benton and Richard Kelley for reporting this issue to us.
This document was written by Garret Wassermann.
Other Information
CVE IDs: | CVE-2015-2894, CVE-2015-2895, CVE-2015-2896 |
Date Public: | 2015-12-08 |
Date First Published: | 2015-12-08 |
Date Last Updated: | 2016-05-16 14:45 UTC |
Document Revision: | 81 |