Description
docPrint Pro 8.0 contains a local buffer overflow vulnerability in the 'Add URL' input field that allows attackers to execute arbitrary code by overwriting memory. Attackers can craft a malicious payload that triggers a structured exception handler (SEH) overwrite to execute shellcode and gain remote system access.
Problem types
Product status
Credits
MasterVlad
References
www.exploit-db.com/exploits/49100
www.exploit-db.com/exploits/49100 (ExploitDB-49100)
www.verypdf.com (Vendor Homepage)
www.vulncheck.com/...o-add-url-buffer-overflow-seh-egghunter (VulnCheck Advisory: docPrint Pro 8.0 - 'Add URL' Buffer Overflow (SEH Egghunter))