header-logo
Suggest Exploit
vendor:
BeOS
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: BeOS
Affected Version From: BeOS 5.0
Affected Version To: BeOS 5.0
Patch Exists: No
Related CWE: N/A
CPE: o:be:beos
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: BeOS
2004

BeOS Direct System Call Vulnerability

A direct system call containing invalid parameters through int 0x25 will cause the BeOS to crash. Reboot of the machine is required in order to regain normal functionality.

Mitigation:

Ensure that all system calls are validated before being executed.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/1098/info

A direct system call containing invalid parameters through int 0x25 will cause the BeOS to crash. Reboot of the machine is required in order to regain normal functionality. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19840.tgz