Description
GTalk Password Finder 2.2.1 contains a denial of service vulnerability that allows attackers to crash the application by supplying an oversized registration key. Attackers can generate a 1000-character payload and paste it into the 'Key' field to trigger an application crash.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Ismail Tasdelen
References
www.exploit-db.com/exploits/47942 (ExploitDB-47942)
www.nsauditor.com/ (Vendor Homepage)
www.vulncheck.com/...k-password-finder-key-denial-of-service (VulnCheck Advisory: GTalk Password Finder 2.2.1 - 'Key' Denial of Service)