Description
Inbit Messenger versions 4.6.0 to 4.9.0 contain a remote stack-based buffer overflow vulnerability that allows unauthenticated attackers to execute arbitrary code by sending malformed network packets. Attackers can craft a specially designed payload targeting the messenger's network handler to overwrite the Structured Exception Handler (SEH) and execute shellcode on vulnerable Windows systems.
Problem types
Product status
Credits
a-rey
References
github.com/...ain/writeups/Inbit_Messenger/v4.6.0/writeup.md
www.exploit-db.com/exploits/51126 (ExploitDB-51126)
web.archive.org/...review/Inbit-Messenger-Basic-Edition.html (Archived Software Download Page)
github.com/...ain/writeups/Inbit_Messenger/v4.6.0/writeup.md (Exploit Write-Up)
www.vulncheck.com/...ger-unauthenticated-remote-seh-overflow (VulnCheck Advisory: Inbit Messenger 4.9.0 - Unauthenticated Remote SEH Overflow)