Description
CloudMe 1.11.2 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code through crafted network packets. Attackers can exploit the vulnerability by sending a specially crafted payload to the CloudMe service running on port 8888, enabling remote code execution.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Xenofon Vassilakopoulos
References
www.exploit-db.com/exploits/48499 (ExploitDB-48499)
www.cloudme.com/en (CloudMe Official Homepage)
www.vulncheck.com/...ries/cloudme-buffer-overflow-sehdepaslr (VulnCheck Advisory: CloudMe 1.11.2 - Buffer Overflow (SEH,DEP,ASLR))