Vulnerability Description
Royal RoyalTSX before 6.0.2.1 allows attackers to cause a denial of service (Heap Memory Corruption and application crash) or possibly have unspecified other impact via a long hostname in an RTSZ file, if the victim clicks on Test Connection. This occurs during SecureGatewayHost object processing in RAPortCheck.createNWConnection.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Royalapps | Royaltsx | < 6.0.2.1 |
Related Weaknesses (CWE)
References
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5788.phpThird Party Advisory
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5788.phpThird Party Advisory
FAQ
What is CVE-2023-52277?
CVE-2023-52277 is a vulnerability with a CVSS score of 7.8 (HIGH). Royal RoyalTSX before 6.0.2.1 allows attackers to cause a denial of service (Heap Memory Corruption and application crash) or possibly have unspecified other impact via a long hostname in an RTSZ file...
How severe is CVE-2023-52277?
CVE-2023-52277 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-52277?
Check the references section above for vendor advisories and patch information. Affected products include: Royalapps Royaltsx.