Description
NetSchedScan 1.0 contains a buffer overflow vulnerability in the scan Hostname/IP field that allows local attackers to crash the application by supplying an oversized input string. Attackers can paste a crafted payload containing 388 bytes of data followed by 4 bytes of EIP overwrite into the Hostname/IP field to trigger a denial of service condition.
Problem types
Product status
References
www.exploit-db.com/exploits/39242 (ExploitDB-39242)
www.vulncheck.com/...dscan-buffer-overflow-denial-of-service (VulnCheck Advisory: NetSchedScan 1.0 Buffer Overflow Denial of Service)