Description
VX Search 10.6.18 contains a local buffer overflow vulnerability that allows attackers to overwrite the instruction pointer by supplying an oversized string in the directory field. Attackers can craft a malicious input file containing 271 bytes of junk data followed by a return address to execute arbitrary code with application privileges.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Kevin McGuigan
References
www.exploit-db.com/exploits/44494 (ExploitDB-44494)
www.7elements.co.uk (Official Product Homepage)
www.vxsearch.com (Official Product Homepage)
www.vulncheck.com/...cal-buffer-overflow-via-directory-field (VulnCheck Advisory: VX Search 10.6.18 Local Buffer Overflow via Directory Field)