Description
NetPCLinker 1.0.0.0 contains a buffer overflow vulnerability in the Clients Control Panel DNS/IP field that allows attackers to execute arbitrary shellcode. Attackers can craft a malicious payload in the DNS/IP input to overwrite SEH handlers and execute shellcode when adding a new client.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Saeed reza Zamanian
References
www.exploit-db.com/exploits/48680 (ExploitDB-48680)
sourceforge.net/projects/netpclinker/ (NetPCLinker SourceForge Page)
www.vulncheck.com/advisories/netpclinker-buffer-overflow (VulnCheck Advisory: NetPCLinker 1.0.0.0 - Buffer Overflow)