Vulnerability Description
NVClient 5.0 contains a stack buffer overflow vulnerability in the user configuration contact field that allows attackers to crash the application. Attackers can overwrite 846 bytes of memory by pasting a crafted payload into the contact box, causing a denial of service condition.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eyemaxsystems | Nvclient | 5.0 |
Related Weaknesses (CWE)
References
- http://download.eyemaxdvr.com/DVST%20ST%20SERIES/CMS/Video%20Surveillance%20ManaProduct
- https://www.exploit-db.com/exploits/51700ExploitThird Party Advisory
- https://www.vulncheck.com/advisories/nvclient-stack-buffer-overflow-vulnerabilitThird Party Advisory
- http://download.eyemaxdvr.com/DVST%20ST%20SERIES/CMS/Video%20Surveillance%20ManaProduct
- https://www.exploit-db.com/exploits/51700ExploitThird Party Advisory
FAQ
What is CVE-2023-53879?
CVE-2023-53879 is a vulnerability with a CVSS score of 5.5 (MEDIUM). NVClient 5.0 contains a stack buffer overflow vulnerability in the user configuration contact field that allows attackers to crash the application. Attackers can overwrite 846 bytes of memory by pasti...
How severe is CVE-2023-53879?
CVE-2023-53879 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-53879?
Check the references section above for vendor advisories and patch information. Affected products include: Eyemaxsystems Nvclient.