First published: Sun Feb 24 2013(Updated: )
Multiple stack-based buffer overflows in AntDS.exe in BigAntSoft BigAnt IM Message Server allow remote attackers to have an unspecified impact via (1) the filename header in an SCH request or (2) the userid component in a DUPF request.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
BigAntSoft BigAnt IM Message Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6275 has a medium severity rating due to the potential for remote code execution through stack-based buffer overflows.
To fix CVE-2012-6275, update to the latest version of BigAnt IM Message Server that addresses this vulnerability.
CVE-2012-6275 is caused by stack-based buffer overflows in AntDS.exe related to improper handling of the filename header in SCH requests and the userid in DUPF requests.
CVE-2012-6275 affects the BigAntSoft BigAnt IM Message Server.
Yes, CVE-2012-6275 can be exploited remotely by attackers sending specially crafted requests to the vulnerable server.