Kolibri CVE-2014-5289 Buffer Overflow Vulnerability
BID:69263
CVE-2014-5289 |Info
Kolibri CVE-2014-5289 Buffer Overflow Vulnerability
| Bugtraq ID: | 69263 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2014-5289 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 17 2014 12:00AM |
| Updated: | Nov 14 2014 01:58AM |
| Credit: | tekwizz123 |
| Vulnerable: |
SENKAS Kolibri 2.0 |
| Not Vulnerable: | |
Discussion
Kolibri CVE-2014-5289 Buffer Overflow Vulnerability
Kolibri is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input.
An attacker can exploit this issue to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in denial-of-service conditions.
Kolibri 2.0 is vulnerable; other versions may also be affected.
Kolibri is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input.
An attacker can exploit this issue to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in denial-of-service conditions.
Kolibri 2.0 is vulnerable; other versions may also be affected.
Exploit / POC
Kolibri CVE-2014-5289 Buffer Overflow Vulnerability
Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.
An attacker can exploit this issue using a web browser.
The following exploit code is available:
Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.
An attacker can exploit this issue using a web browser.
The following exploit code is available:
Solution / Fix
Kolibri CVE-2014-5289 Buffer Overflow Vulnerability
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].