Description
Angry IP Scanner 3.5.3 contains a buffer overflow vulnerability in the preferences dialog that allows local attackers to crash the application by supplying an excessively large string. Attackers can generate a file containing a massive buffer of repeated characters and paste it into the unavailable value field in the display preferences to trigger a denial of service.
Problem types
Product status
Credits
Fernando Cruz
References
www.exploit-db.com/exploits/45993 (ExploitDB-45993)
angryip.org (Official Product Homepage)
www.vulncheck.com/...service-via-preferences-buffer-overflow (VulnCheck Advisory: Angry IP Scanner 3.5.3 Denial of Service via Preferences Buffer Overflow)