vendor:
SysGauge
by:
Peter Baris
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: SysGauge
Affected Version From: 1.5.18
Affected Version To: 1.5.18
Patch Exists: NO
Related CWE: CVE not available
CPE: sysgauge
Metasploit:
https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-3341/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2023-4583/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2023-4583/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2023-4583/, https://www.rapid7.com/db/vulnerabilities/alma_linux-cve-2023-4583/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-4583/, https://www.rapid7.com/db/vulnerabilities/mozilla-thunderbird-cve-2023-4583/, https://www.rapid7.com/db/vulnerabilities/mfsa2023-36-cve-2023-4583/, https://www.rapid7.com/db/vulnerabilities/mfsa2023-34-cve-2023-4583/, https://www.rapid7.com/db/vulnerabilities/notepadplusplus-cve-2023-40164/, https://www.rapid7.com/db/vulnerabilities/notepadplusplus-cve-2023-40166/, https://www.rapid7.com/db/vulnerabilities/notepadplusplus-cve-2023-40036/, https://www.rapid7.com/db/vulnerabilities/adobe-coldfusion-cve-2023-38205/, https://www.rapid7.com/db/vulnerabilities/adobe-coldfusion-cve-2023-38206/, https://www.rapid7.com/db/vulnerabilities/adobe-coldfusion-cve-2023-38204/, https://www.rapid7.com/db/vulnerabilities/adobe-coldfusion-cve-2023-38203/, https://www.rapid7.com/db/vulnerabilities/adobe-coldfusion-cve-2023-29300/, https://www.rapid7.com/db/vulnerabilities/adobe-coldfusion-cve-2023-29301/, https://www.rapid7.com/db/vulnerabilities/adobe-coldfusion-cve-2023-29298/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-34095/, https://www.rapid7.com/db/?q=CVE+not+available&type=&page=2, https://www.rapid7.com/db/?q=CVE+not+available&type=&page=3, https://www.rapid7.com/db/?q=CVE+not+available&type=&page=4, https://www.rapid7.com/db/?q=CVE+not+available&type=&page=2
Platforms Tested: Windows Server 2008 R2 Standard x64
2017
SysGauge 1.5.18 – buffer overflow in SMTP connection verification function leads to code execution
The exploit allows an attacker to execute arbitrary code by exploiting a buffer overflow vulnerability in the SMTP connection verification function in SysGauge version 1.5.18. The vulnerability can be triggered by sending a specially crafted request to the affected software. Successful exploitation of this vulnerability could lead to remote code execution.
Mitigation:
Update to the latest version of SysGauge to mitigate the vulnerability.