vendor:
Wnn4.2
by:
UNYUN
7.5
CVSS
HIGH
Remote Buffer Overflow
120 (Buffer Copy without Checking Size of Input)
CWE
Product Name: Wnn4.2
Affected Version From: Wnn4.2
Affected Version To: Wnn4.2
Patch Exists: YES
Related CWE: N/A
CPE: a:wnn_project:wnn4.2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2002
Wnn4.2 / jserver remote buffer overflow exploit for Linux
A remote buffer overflow exists in the Asian language servers portion of a number of different implementations of Wnn. It has been reported that only systems that have WorldView Japanese, Korean, and Chinese installed are vulnerable to this issue. An overflow exists when the server receives a long string with a Wnn command, such as JS_OPEN, JS_MKDIR or JS_FILE_INFO included. By creating a buffer containing machine executable code, it is possible to cause a remote system running the jserver daemon to execute arbitrary commands as the user the daemon is running as.
Mitigation:
Ensure that all user-supplied input is validated and sanitized before being used in any system operations.