Description
SpotMSN 2.4.6 contains a denial of service vulnerability in the registration name input field that allows attackers to crash the application. Attackers can generate a 1000-character payload and paste it into the 'Name' field to trigger an application crash.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Ismail Tasdelen
References
www.exploit-db.com/exploits/47869 (ExploitDB-47869)
www.nsauditor.com/ (Vendor Homepage)
www.vulncheck.com/advisories/spotmsn-name-denial-of-service (VulnCheck Advisory: SpotMSN 2.4.6 - 'Name' Denial of Service)