Overview
The Up.time client for Windows is vulnerable to an format string attack as well as a buffer overflow, and may allow unauthenticated users to perform certain commands.
Description
| CWE-134: Uncontrolled Format String - CVE-2015-2894 For version 6.0 and 7.2, an unauthenticated attacker on the network may send either the "%n" or "%s" format parameters will cause the application to crash. This vulnerability was addressed in version 7.6. | 
Impact
| A remote unauthenticated user may be able to perform a denial of service on Up.time, or obtain system information for future use. It may also be possible to execute code. | 
Solution
| Apply an update | 
| Check configuration | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | 6.4 | AV:N/AC:L/Au:N/C:N/I:P/A:P | 
| Temporal | 5.5 | E:POC/RL:U/RC:UR | 
| Environmental | 4.1 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND | 
References
Acknowledgements
Thanks to Matthew Benton and Richard Kelley for reporting this issue to us.
This document was written by Garret Wassermann.
Other Information
| CVE IDs: | CVE-2015-2894, CVE-2015-2895, CVE-2015-2896 | 
| Date Public: | 2015-12-08 | 
| Date First Published: | 2015-12-08 | 
| Date Last Updated: | 2016-05-16 14:45 UTC | 
| Document Revision: | 81 |