Description
ChaosPro 2.0 contains a buffer overflow vulnerability in the configuration file path handling that allows attackers to execute arbitrary code by overwriting the Structured Exception Handler. Attackers can craft a malicious configuration file with carefully constructed payload to overwrite memory and gain remote code execution on vulnerable Windows XP systems.
Problem types
Product status
Credits
Chase Hatch (SYANiDE)
References
www.exploit-db.com/exploits/47551 (ExploitDB-47551)
www.chaospro.de/ (Vendor Homepage)
www.vulncheck.com/advisories/chaospro-buffer-overflow (VulnCheck Advisory: ChaosPro 2.0 - Buffer Overflow)