Vulnerability Description
Buffer overflow in Canary Labs Trend Web Server before 9.5.2 allows remote attackers to execute arbitrary code via a crafted TCP packet.
CVSS Score
7.5
HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canarylabs | Trendweb | <= 9.0.2.27051 |
Related Weaknesses (CWE)
References
- http://jvn.jp/en/jp/JVN07676450/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2015-000140Vendor Advisory
- http://jvn.jp/en/jp/JVN07676450/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2015-000140Vendor Advisory
FAQ
What is CVE-2015-5653?
CVE-2015-5653 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in Canary Labs Trend Web Server before 9.5.2 allows remote attackers to execute arbitrary code via a crafted TCP packet.
How severe is CVE-2015-5653?
CVE-2015-5653 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5653?
Check the references section above for vendor advisories and patch information. Affected products include: Canarylabs Trendweb.