Description
iCash 7.6.5 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload through the Connect to Server dialog. Attackers can paste a 7000-byte string into the Host field and click Connect to trigger an application crash.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Gionathan "John" Reale
References
www.exploit-db.com/exploits/45388 (ExploitDB-45388)
www.vulncheck.com/...denial-of-service-via-connect-to-server (VulnCheck Advisory: iCash 7.6.5 Denial of Service via Connect to Server)