Vulnerability Details : CVE-2017-14980
Public exploit exists!
Buffer overflow in Sync Breeze Enterprise 10.0.28 allows remote attackers to have unspecified impact via a long username parameter to /login.
Vulnerability category: Overflow
Products affected by CVE-2017-14980
- cpe:2.3:a:flexense:syncbreeze:10.0.28:*:*:*:enterprise:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-14980
80.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2017-14980
-
Sync Breeze Enterprise GET Buffer Overflow
Disclosure Date: 2017-03-15First seen: 2020-04-26exploit/windows/http/syncbreeze_bofThis module exploits a stack-based buffer overflow vulnerability in the web interface of Sync Breeze Enterprise v9.4.28, v10.0.28, and v10.1.16, caused by improper bounds checking of the request in HTTP GET and POST requests sent to the built-in web server. This
CVSS scores for CVE-2017-14980
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2017-14980
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-14980
-
http://packetstormsecurity.com/files/144452/Sync-Breeze-Enterprise-10.0.28-Buffer-Overflow.html
Sync Breeze Enterprise 10.0.28 Buffer Overflow ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to