Description
Outlook Password Recovery 2.10 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload. Attackers can create a malicious text file containing 6000 bytes of data and paste it into the User Name and Registration Code field to trigger a denial of service condition.
Problem types
Product status
Credits
Velayutham Selvaraj & Praveen Thiyagarayam (TwinTech Solutions)
References
www.exploit-db.com/exploits/47309 (ExploitDB-47309)
www.vulncheck.com/...overy-denial-of-service-buffer-overflow (VulnCheck Advisory: Outlook Password Recovery 2.10 Denial of Service Buffer Overflow)