vendor:
GTypist
by:
Juan Sacco
7,8
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: GTypist
Affected Version From: 2.9.5-2
Affected Version To: 2.9.5-2
Patch Exists: YES
Related CWE: N/A
CPE: a:gnu:gtypist:2.9.5-2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Kali Linux 2.0 x86
2020
Exploit GNU GTypist – Local Overflow Exploit
This exploit is a local buffer overflow exploit for GNU GTypist. It uses a NOPSLED, shellcode and EIP to overwrite the return address and execute the shellcode. The exploit is developed using Exploit Pack v6.5 and tested and developed under Kali Linux 2.0 x86.
Mitigation:
Ensure that the program is updated to the latest version and that all security patches are applied.