Summary
The host is running ChaSen Software and is prone to buffer overflow vulnerability
Impact
Successful exploitation allows remote attackers to cause a buffer overflow or execute arbitrary code.
Impact Level: System/Application
Solution
Use ChaSen Version 2.3.3,
For updates refer to http://chasen.naist.jp/hiki/ChaSen/
Insight
The flaw is due to an error when reading user-supplied input string, which allows attackers to execute arbitrary code via a crafted string.
Affected
ChaSen Version 2.4.x
References
Severity
Classification
-
CVE CVE-2011-4000 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities