Vulnerability Description
Multiple stack-based buffer overflows in the DIVA web service API (/webservice) in VDG Security SENSE (formerly DIVA) 2.3.13 allow remote attackers to execute arbitrary code via the (1) user or (2) password parameter in an AuthenticateUser request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vdgsecurity | Vdg Sense | 2.3.13 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-DisclExploit
- http://seclists.org/fulldisclosure/2014/Dec/76Exploit
- http://www.securityfocus.com/bid/71736
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99334
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-Exploit
- http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-DisclExploit
- http://seclists.org/fulldisclosure/2014/Dec/76Exploit
- http://www.securityfocus.com/bid/71736
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99334
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-Exploit
FAQ
What is CVE-2014-9451?
CVE-2014-9451 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple stack-based buffer overflows in the DIVA web service API (/webservice) in VDG Security SENSE (formerly DIVA) 2.3.13 allow remote attackers to execute arbitrary code via the (1) user or (2) pa...
How severe is CVE-2014-9451?
CVE-2014-9451 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9451?
Check the references section above for vendor advisories and patch information. Affected products include: Vdgsecurity Vdg Sense.