Unrated severityNVD Advisory· Published Feb 11, 2018· Updated Aug 5, 2024
CVE-2018-6892
CVE-2018-6892
Description
An issue was discovered in CloudMe before 1.11.0. An unauthenticated remote attacker that can connect to the "CloudMe Sync" client application listening on port 8888 can send a malicious payload causing a buffer overflow condition. This will result in an attacker controlling the program's execution flow and allowing arbitrary code execution.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- www.exploit-db.com/exploits/44027/mitreexploitx_refsource_EXPLOIT-DB
- www.exploit-db.com/exploits/44175/mitreexploitx_refsource_EXPLOIT-DB
- www.exploit-db.com/exploits/45197/mitreexploitx_refsource_EXPLOIT-DB
- www.exploit-db.com/exploits/46250/mitreexploitx_refsource_EXPLOIT-DB
- www.exploit-db.com/exploits/48840mitreexploitx_refsource_EXPLOIT-DB
- hyp3rlinx.altervista.org/advisories/CLOUDME-SYNC-UNAUTHENTICATED-REMOTE-BUFFER-OVERFLOW.txtmitrex_refsource_MISC
- packetstormsecurity.com/files/157407/CloudMe-1.11.2-Buffer-Overflow.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/158716/CloudMe-1.11.2-SEH-Buffer-Overflow.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/159327/CloudMe-1.11.2-Buffer-Overflow.htmlmitrex_refsource_MISC
- blogs.securiteam.com/index.php/archives/3669mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.