WebMod Content Length Stack Buffer Overflow Vulnerability
BID:22788
Info
WebMod Content Length Stack Buffer Overflow Vulnerability
| Bugtraq ID: | 22788 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2007-1260 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 02 2007 12:00AM |
| Updated: | May 12 2015 07:34PM |
| Credit: | Kevin Masterson is credited with the discovery of this vulnerability. |
| Vulnerable: |
WebMod WebMod 0.48 |
| Not Vulnerable: | |
Discussion
WebMod Content Length Stack Buffer Overflow Vulnerability
WebMod is prone to a remote stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.
Exploiting this issue may allow attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely result in a denial-of-service condition.
This issue affects version 0.48; other versions may also be affected.
WebMod is prone to a remote stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.
Exploiting this issue may allow attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely result in a denial-of-service condition.
This issue affects version 0.48; other versions may also be affected.
Exploit / POC
WebMod Content Length Stack Buffer Overflow Vulnerability
The following exploit code is available:
The following exploit code is available:
Solution / Fix
WebMod Content Length Stack Buffer Overflow Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].