Description
SpotIM 2.2 contains a denial of service vulnerability that allows attackers to crash the application by inputting a large buffer in the registration name field. Attackers can generate a 1000-character payload and paste it into the 'Name' field to trigger an application crash.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Ismail Tasdelen
References
www.exploit-db.com/exploits/47870 (ExploitDB-47870)
www.nsauditor.com/ (Vendor Homepage)
www.vulncheck.com/advisories/spotim-name-denial-of-service (VulnCheck Advisory: SpotIM 2.2 - 'Name' Denial Of Service)