Description
LanSend 3.2 contains a buffer overflow vulnerability in the Add Computers Wizard file import functionality that allows remote attackers to execute arbitrary code. Attackers can craft a malicious payload file to trigger a structured exception handler (SEH) overwrite and execute shellcode when importing computers from a file.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
gurbanli
References
www.exploit-db.com/exploits/48461 (ExploitDB-48461)
lizardsystems.com/lansend/ (LanSend Product Webpage)
www.vulncheck.com/advisories/lansend-buffer-overflow-seh (VulnCheck Advisory: LanSend 3.2 - Buffer Overflow (SEH))