header-logo
Suggest Exploit
vendor:
WikiReader
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer-Overflow
119
CWE
Product Name: WikiReader
Affected Version From: 1.12
Affected Version To: 1.12
Patch Exists: YES
Related CWE: N/A
CPE: a:wikireader:wikireader
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

WikiReader Local Buffer-Overflow Vulnerability

WikiReader is prone to a local buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input data to an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application; failed exploit attempts will result in a denial-of-service condition.

Mitigation:

Input validation should be used to prevent buffer overflows.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/21718/info

WikiReader is prone to a local buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input data to an insufficiently sized buffer.

An attacker can exploit this issue to execute arbitrary code within the context of the affected application; failed exploit attempts will result in a denial-of-service condition.

This issue affects version 1.12; other versions may also be vulnerable.

URL: 16635 x "A"