Vulnerability Details : CVE-2015-2097
Potential exploit
Multiple buffer overflows in WebGate Embedded Standard Protocol (WESP) SDK allow remote attackers to execute arbitrary code via unspecified vectors to the (1) LoadImage or (2) LoadImageEx function in the WESPMonitor.WESPMonitorCtrl.1 control, (3) ChangePassword function in the WESPCONFIGLib.UserItem control, Connect function in the (4) WESPSerialPort.WESPSerialPortCtrl.1 or (5) WESPPLAYBACKLib.WESPPlaybackCtrl control, or (6) AddID function in the WESPCONFIGLib.IDList control or a (7) long string to the second argument to the ConnectEx3 function in the WESPPLAYBACKLib.WESPPlaybackCtrl control.
Vulnerability category: Execute code
Products affected by CVE-2015-2097
- cpe:2.3:a:webgate:webgate_embedded_standard_protocol_sdk:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-2097
57.68%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-2097
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2015-2097
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-2097
-
https://www.exploit-db.com/exploits/36602/
WebGate WESP SDK 1.2 - ChangePassword Stack OverflowExploit
-
http://www.zerodayinitiative.com/advisories/ZDI-15-059/
ZDI-15-059 | Zero Day Initiative
-
http://www.securityfocus.com/bid/72835
WebGate eDVR Manager CVE-2015-2097 Multiple Stack Buffer Overflow Vulnerabilities
-
http://www.osvdb.org/118896
404 Not Found
-
http://www.zerodayinitiative.com/advisories/ZDI-15-062/
ZDI-15-062 | Zero Day Initiative
-
http://seclists.org/fulldisclosure/2015/Feb/90
Full Disclosure: WESP SDK multiple Remote Code Execution VulnerabilitiesExploit
-
http://www.zerodayinitiative.com/advisories/ZDI-15-068/
ZDI-15-068 | Zero Day Initiative
-
https://www.exploit-db.com/exploits/36505/
WebGate eDVR Manager - Remote Stack Buffer Overflow
-
http://www.osvdb.org/118902
404 Not Found
-
http://packetstormsecurity.com/files/131072/WebGate-eDVR-Manager-Stack-Buffer-Overflow.html
WebGate eDVR Manager Stack Buffer Overflow ≈ Packet StormExploit
-
https://www.exploit-db.com/exploits/36607/
WebGate eDVR Manager 2.6.4 - Connect Method Stack Buffer Overflow
-
http://www.osvdb.org/118893
404 Not Found
Jump to