Intrusion Prevention

EFS.Chat.Server.POST.Request.Username.Buffer.Overflow

Description

This indicates an attack attempt against a Buffer Overflow vulnerability in EFS Software Easy Chat Server.
The vulnerability is caused by an error when the application handles HTTP POST requests with overlong username. A remote attacker may be able to exploit this to execute arbitrary code on vulnerable systems via a crafted HTTP request.

Affected Products

EFS Easy Chat Server version from 2.0 to 3.1

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Currently we are unaware of any vendor supplied patch for this issue.

CVE References

CVE-2017-9544