First published: Mon May 08 2017(Updated: )
Gemalto SmartDiag Diagnosis Tool v2.5 has a stack-based Buffer Overflow with SEH Overwrite via long "Register a new card" input fields. There may be a risk of local code execution with untrusted input to SmartDiag.exe or SymDiag.exe.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gemalto SmartDiag Diagnosis Tool | <=2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6953 has a critical severity due to the potential for local code execution through a stack-based buffer overflow.
To fix CVE-2017-6953, update to a version of Gemalto SmartDiag Diagnosis Tool later than 2.5 to mitigate the vulnerability.
CVE-2017-6953 affects Gemalto SmartDiag Diagnosis Tool version 2.5 and earlier.
CVE-2017-6953 primarily poses a risk of local exploitation through untrusted input, rather than remote attacks.
Exploitation of CVE-2017-6953 may lead to local code execution, allowing an attacker to run arbitrary code on the affected system.