Description
Easyboot 6.6.0 contains a buffer overflow vulnerability in the Replace Text function that allows local attackers to crash the application by supplying an oversized string. Attackers can trigger the vulnerability by accessing File > Tools > Replace Text and pasting a 7000-byte payload into the text fields to cause a denial of service.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Gionathan "John" Reale
References
www.exploit-db.com/exploits/45241 (ExploitDB-45241)
www.ezbsystems.com/ (Official Product Homepage)
www.vulncheck.com/...yboot-buffer-overflow-denial-of-service (VulnCheck Advisory: Easyboot 6.6.0 Buffer Overflow Denial of Service)