Vulnerability Description
An issue was discovered in SysGauge 1.5.18. A buffer overflow vulnerability in SMTP connection verification leads to arbitrary code execution. The attack vector is a crafted SMTP daemon that sends a long 220 (aka "Service ready") string.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Flexense | Sysgauge | 1.5.18 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/96568
- https://www.exploit-db.com/exploits/41479/ExploitVDB Entry
- http://www.securityfocus.com/bid/96568
- https://www.exploit-db.com/exploits/41479/ExploitVDB Entry
FAQ
What is CVE-2017-6416?
CVE-2017-6416 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in SysGauge 1.5.18. A buffer overflow vulnerability in SMTP connection verification leads to arbitrary code execution. The attack vector is a crafted SMTP daemon that sends a l...
How severe is CVE-2017-6416?
CVE-2017-6416 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-6416?
Check the references section above for vendor advisories and patch information. Affected products include: Flexense Sysgauge.