Description
SysGauge Pro 4.6.12 contains a local buffer overflow vulnerability in the Register function that allows local attackers to overwrite the structured exception handler by supplying a crafted unlock key. Attackers can inject shellcode through the Unlock Key field during registration to execute arbitrary code with application privileges.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Hashim Jawad #
References
www.exploit-db.com/exploits/44455 (ExploitDB-44455)
www.vulncheck.com/.../sysgauge-pro-local-buffer-overflow-seh (VulnCheck Advisory: SysGauge Pro 4.6.12 Local Buffer Overflow SEH)