vendor:
FeedDemon
by:
cenjan
9.3
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: FeedDemon
Affected Version From: 2.7.0.0
Affected Version To: 2.7.0.0
Patch Exists: NO
Related CWE: CVE-2008-4010
CPE: a:newsgator:feeddemon
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=50549, https://www.infosecmatter.com/nessus-plugin-library/?id=131929, https://www.infosecmatter.com/nessus-plugin-library/?id=25971, https://www.infosecmatter.com/nessus-plugin-library/?id=131928, https://www.infosecmatter.com/nessus-plugin-library/?id=131927
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP Sp2 (English)
2008
FeedDemon version 2.7.0.0 Buffer overFlow
FeedDemon version 2.7.0.0 is prone to a buffer overflow vulnerability when importing a specially crafted OPML file. This could allow an attacker to execute arbitrary code in the context of the application. This vulnerability is due to a boundary error when the application handles the 'text' parameter of an OPML file. An attacker can exploit this vulnerability by enticing a legitimate user to import a malicious OPML file.
Mitigation:
No known mitigation is available at this time.