Description
Faleemi Plus 1.0.2 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying oversized input strings. Attackers can paste a 2000-byte payload into the Camera name and DID number fields during camera addition to trigger an application crash.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Gionathan "John" Reale
References
www.exploit-db.com/exploits/45414 (ExploitDB-45414)
support.faleemi.com/fsc776/Faleemi_Plus_v1.0.2.exe (Product Reference)
www.vulncheck.com/...s-denial-of-service-via-buffer-overflow (VulnCheck Advisory: Faleemi Plus 1.0.2 Denial of Service via Buffer Overflow)