Description
SpotOutlook 1.2.6 contains a denial of service vulnerability in the registration name input field that allows attackers to crash the application. Attackers can overwrite the buffer by pasting 1000 'A' characters into the 'Name' field, causing the application to become unresponsive.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Ismail Tasdelen
References
www.exploit-db.com/exploits/47906 (ExploitDB-47906)
www.nsauditor.com/ (Vendor Homepage)
www.vulncheck.com/...ries/spotoutlook-name-denial-of-service (VulnCheck Advisory: SpotOutlook 1.2.6 - 'Name' Denial of Service)