vendor:
Polymorph
by:
demz
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Polymorph
Affected Version From: Polymorph v0.4.0
Affected Version To: Polymorph v0.4.0
Patch Exists: YES
Related CWE: N/A
CPE: a:polymorph:polymorph:0.4.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2003
Polymorph for Linux Buffer Overflow Vulnerability
The issue is reportedly due to a lack of sufficient bounds checking performed on user-supplied data before it is copied into an internal memory space. Specifically, excessive data passed as the 'file' argument to the vulnerable Polymorph executable, when copied into internal memory, may overrun the boundary of the assigned buffer and corrupt adjacent memory. This vulnerability may be exploited to execute arbitrary attacker-supplied code.
Mitigation:
Input validation should be used to ensure that user-supplied data does not exceed the size of the target buffer.