SB2017061216 - Multiple vulnerabilities in Easy Chat Server



SB2017061216 - Multiple vulnerabilities in Easy Chat Server

Published: June 12, 2017 Updated: August 8, 2020

Security Bulletin ID SB2017061216
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Medium 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2019-20502)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

An issue was discovered in EFS Easy Chat Server 3.1. There is a buffer overflow via a long body2.ghp message parameter.


2) Information disclosure (CVE-ID: CVE-2017-9557)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

register.ghp in EFS Software Easy Chat Server versions 2.0 to 3.1 allows remote attackers to discover passwords by sending the username parameter in conjunction with an empty password parameter, and reading the HTML source code of the response.


3) Improper Authentication (CVE-ID: CVE-2017-9543)

The vulnerability allows a remote non-authenticated attacker to manipulate data.

register.ghp in EFS Software Easy Chat Server versions 2.0 to 3.1 allows remote attackers to reset arbitrary passwords via a crafted POST request to registresult.htm.


4) Buffer overflow (CVE-ID: CVE-2017-9544)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

There is a remote stack-based buffer overflow (SEH) in register.ghp in EFS Software Easy Chat Server versions 2.0 to 3.1. By sending an overly long username string to registresult.htm for registering the user, an attacker may be able to execute arbitrary code.


Remediation

Install update from vendor's website.