There is a remote stack-based buffer overflow (SEH) in register.ghp in EFS Software Easy Chat Server versions 2.0 to 3.1. By sending an overly long username string to registresult.htm for registering the user, an attacker may be able to execute arbitrary code.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.exploit-db.com/exploits/42155/ |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T17:11:02.122Z
Reserved: 2017-06-11T00:00:00
Link: CVE-2017-9544

No data.

Status : Modified
Published: 2017-06-12T06:29:00.557
Modified: 2024-11-21T03:36:22.123
Link: CVE-2017-9544

No data.