IBM Merge Healthcare eFilm Workstation License Server CopySLS_Request3 Buffer Overflow

EIP-21c968fc

A stack-based buffer overflow exists in IBM Merge Healthcare eFilm Workstation license server. A remote, unauthenticated attacker can exploit this vulnerability to achieve remote code execution with SYSTEM privileges.

Vulnerability Identifier

  • Exodus Intelligence: EIP-21c968fc
  • MITRE: CVE-2024-23622

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
  • CVSSv2 Score: 10.0

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: July 30, 2021
  • Vendor response to disclosure: August 23, 2021
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

IBM Merge Healthcare eFilm Workstation SYSTEM Privilege Escalation

EIP-ac73ca7c

An improper privilege management vulnerability exists in IBM Merge Healthcare eFilm Workstation. A local, authenticated attacker can exploit this vulnerability to escalate privileges to SYSTEM.

Vulnerability Identifier

  • Exodus Intelligence: EIP-ac73ca7c
  • MITRE: CVE-2024-23620

Vulnerability Metrics

  • CVSSv2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C
  • CVSSv2 Score: 6.8

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: July 30, 2021
  • Vendor response to disclosure: August 23, 2021
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

Symantec Deployment Solution axengine.exe Buffer Overflow Remote Code Execution

EIP-6cce200a

A buffer overflow vulnerability exists in Symantec Deployment Solution version 7.9. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as SYSTEM.

Vulnerability Identifier

  • Exodus Intelligence: EIP-6cce200a
  • MITRE: CVE-2024-23613

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
  • CVSSv2 Score: 9.3

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: August 11, 2021
  • Vendor response to disclosure: July 17, 2022
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

Symantec Messaging Gateway libdec2lha.so Stack Buffer Overflow Remote Code Execution

EIP-a9e61262

A stack buffer overflow exists in Symantec Messaging Gateway in versions 9.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution.

Vulnerability Identifier

  • Exodus Intelligence: EIP-a9e61262
  • MITRE: CVE-2024-23615

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
  • CVSSv2 Score: 10.0

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: August 11, 2021
  • Vendor response to disclosure: June 17, 2022
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

Symantec Data Loss Prevention wp6sr.dll Stack Buffer Overflow Remote Code Execution

EIP-17a47dc2

A stack buffer overflow exists in Symantec Data Loss Prevention versions 14.0.2 and before. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specifically crafted document to achieve remote code execution.

Vulnerability Identifier

  • Exodus Intelligence: EIP-17a47dc2
  • MITRE: CVE-2024-23617

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
  • CVSSv2 Score: 9.3

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: August 11, 2021
  • Vendor response to disclosure: June 17, 2022
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

Symantec Server Management Suite axengine.exe Buffer Overflow Remote Code Execution

EIP-91da78e7

A buffer overflow vulnerability exists in Symantec Server Management Suite version 7.9 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as SYSTEM.

Vulnerability Identifier

  • Exodus Intelligence: EIP-91da78e7
  • MITRE: CVE-2024-23616

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
  • CVSSv2 Score: 10.0

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: August 11, 2021
  • Vendor response to disclosure: June 17, 2022
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

Symantec Messaging Gateway wp6sr.so Stack Buffer Overflow Remote Code Execution

EIP-1e5e28b3

A stack buffer overflow exists in Symantec Messaging Gateway in versions 9.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution.

Vulnerability Identifier

  • Exodus Intelligence: EIP-1e5e28b3
  • MITRE: CVE-2024-23614

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:N
  • CVSSv2 Score: 9.4

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: August 11, 2021
  • Vendor response to disclosure: September 27, 2021
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

Delta Electronics Delta Industrial Automation DOPSoft DPS File wLogTitlesTimeLen Buffer Overflow Remote Code Execution

EIP-32a68e8b

A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wLogTitlesTimeLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.

Vulnerability Identifier

  • Exodus Intelligence: EIP-32a68e8b
  • MITRE: CVE-2023-43822

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
  • CVSSv2 Score: 6.8

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline 

  • Disclosed to Vendor: March 8, 2023
  • Vendor response to disclosure: March 22, 2023
  • Disclosed to public: January 18, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com