Description
TapinRadio 2.12.3 contains a denial of service vulnerability in the application proxy username configuration that allows local attackers to crash the application. Attackers can overwrite the username field with 10,000 bytes of arbitrary data to trigger an application crash and prevent normal program functionality.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
chuyreds
References
www.exploit-db.com/exploits/48013 (ExploitDB-48013)
www.raimersoft.com/php/tapinradio.php (TapinRadio Product Webpage)
www.vulncheck.com/...s/tapinradio-username-denial-of-service (VulnCheck Advisory: TapinRadio 2.12.3 - 'username' Denial of Service)