Description
Code Blocks 17.12 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by crafting a malicious file name with Unicode characters. Attackers can trigger the vulnerability by pasting a specially crafted payload into the file name field during project creation, potentially executing system commands like calc.exe.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Paras Bhatia
References
www.exploit-db.com/exploits/48594 (ExploitDB-48594)
www.codeblocks.org/ (Code Blocks Official Website)
sourceforge.net/projects/codeblocks (Code Blocks SourceForge Page)
www.vulncheck.com/...-blocks-file-name-local-buffer-overflow (VulnCheck Advisory: Code Blocks 17.12 - 'File Name' Local Buffer Overflow)